Search results

  1. M33

    Romania chucks €21m at IBM for Bucharest IT project

    IBM will get €21m in state aid from Romania's government for a €51.2m project in the country that's expected to create around 900 jobs. Big Blue is planning an IT consultancy project in Bucharest and Brasov, the Ministry of Finance told financial daily Ziarul Financier (translated by Google...
  2. M33

    Sony and Panasonic sign basic agreement to jointly develop standard for professional-

    Tokyo, Japan - July 29, 2013 - Sony Corporation (‘Sony’) and Panasonic Corporation (‘Panasonic’) today announced that they have signed a basic agreement with the objective of jointly developing a next-generation standard for professional-use optical discs, with the objective of expanding their...
  3. M33

    Mozilla teams up with BlackBerry on security research tools

    Mozilla has teamed up with BlackBerry to develop a tool which will allow researchers to better spot security vulnerabilities in web browsers. The companies said that the tool would provide an open framework which security researchers could use to perform “fuzzing” techniques. Such practices are...
  4. M33

    NASA cloud computing use blasted for security and management failings

    Nasa's cloud computing strategy came under fire from US authorities, with concerns raised about major security failings and a lack of communication and organisation. The report from the US Office of Inspector General (OIG) stated that Nasa's cloud services "failed to meet key IT security...
  5. M33

    Oz government denies Lenovo ban for top secret networks

    The Australian Department of Defence has issued an official statement denying it banned the use of Lenovo computers over concerns they contained backdoor vulnerabilities. A report from the Australian Financial Review last weekend claimed that the ban applied to top secret networks run by the...
  6. M33

    PRISM: NSA used XKeyscore software to trawl billions of email and internet records

    The software powering the US National Security Agency's (NSA) powerful search techniques have been revealed. Called XKeyscore, the software is a basic web form which trawls through hundreds of billions of recorded internet traffic to list relevant results. Revealed by the Guardian today...
  7. M33

    PhishMe launches Phish Reporter tool to let staff alert IT to malware scams

    Security firm PhishMe has unveiled new Phish Reporter technology designed to help employees more quickly alert IT departments about harmful messages. The company unveiled the new service at Black Hat in Las Vegas, promising it will help companies better defend themselves from phishing and...
  8. M33

    Microsoft Readying Live Hacker Judging At Black Hat

    Microsoft (NSDQ:MSFT) is set to judge live attempts to bypass the security defenses in its latest operating system -- Windows 8.1 Preview -- giving hackers an attempt to earn $100,000 as part of the company's new bug bounty reward program. Hackers will use their working exploits on a Lenovo...
  9. M33

    5 scariest cybersecurity threats at Black Hat, Defcon

    An annual show-and-tell of some of the most alarming security breaches currently known is underway at two hacker conferences being held in Las Vegas this week. Cybersecurity researchers, hackers, government agencies and privacy advocates converge at Black Hat and Defcon to share the results of...
  10. M33

    MIT report: We did not 'target' Aaron Swartz

    An internal report by the Massachusetts Institute of Technology has found that it committed no wrongdoing in the case of Internet activist Aaron Swartz, who committed suicide while facing charges he hacked into the university's computers and stole millions of online documents. The report "makes...
  11. M33

    Cyber jihad as Indonesia and Bangladesh BLOW EACH OTHER off the web

    A cyber-jihad has erupted between groups of rival Islamic hackers in Bangladesh and Indonesia, resulting in attacks on hundreds of sites. The rival hackers have abandoned their normal pursuit of Israeli targets and have instead turned on each other. It is unclear which side started the war...
  12. M33

    Black Hat: Researchers exploit iPhone flaws with charger attack

    A trio of university researchers have developed a method for infecting iOS devices through the Apple power port. Posing as a charger device, the Mactan proof-of-concept is able to pair with an iOS device, gain access to heightened privileges and install both hidden and visible applications onto...
  13. M33

    Black Hat: Researchers hack femtocells to grab voice, data and SMS traffic

    Researchers are calling on mobile operators worldwide to drop support for femtocell units following harrowing proof-of-concept demonstration. Security firm iSEC Partners drew a packed house at the conference when it demonstrated a simple system which compromised aVerizon femtocell unit and then...
  14. M33

    Microsoft highlights security updates of Windows 8.1

    Microsoft's upcoming launch of Windows 8.1 is set to include a host of features designed to simplify authentication and data protection, the company said. Speaking with V3 at the 2013 Black Hat conference, Microsoft Windows security and identity group program manager Dustin Ingalls said that the...
  15. M33

    Boffins say they've FOOLED APPLE with malware app

    Black Hat 2013 Researchers from Georgia Tech's Information Security Center (GTISC) claim to have found a way to sneak a malware-ridden app through Apple's inspection regime, and have also raised concerns about “malicious chargers” for iPhones. The GTISC team explains its research here and...
  16. M33

    D-Link patches vid storage units

    D-Link has issued patches for a pair of its network video recorders after a Qualys analysis identified remote authentication bypass vulnerabilities. The DNR-322L and DNR-326 recorders are midrange 4TB recorders which among other things can be used as recorders for the company's IP cameras. As...
  17. M33

    Hackers crack femtocells to pwn then clone phones

    Black Hat 2013 Security researchers have warned against the industry's use of femtocells after successfully hacking into two popular models of femtocell, allowing them to intercept voice and SMS information from nearby mobile devices. The exploit was detailed by iSEC Partners at the Black...
  18. M33

    Malicious JavaScript flips ad network into rentable botnet

    Black Hat 2013 Security researchers have shown how hackers can use ad networks to create ephemeral, hard-to-trace botnets that can perform distributed-denial-of-service attacks at the click of a button. In a presentation at the Black Hat conference in Las Vegas on Wednesday, researchers...
  19. M33

    NSA headman: 'Don't worry, our watchful analysts TAKE EXAMS'

    Black Hat 2013 NSA head General Keith Alexander believes the NSA's data-slurping programs should "be something we put forward as an example to the rest of the world," due to the oversight afforded by the courts, Congress, and the administration. The spy chief made his remarks at the Black...
  20. M33

    OCSP Stapling in Firefox

    OCSP Stapling in Firefox' dkeeler OCSP Stapling has landed in the latest Nightly builds of Firefox! OCSP stapling is a mechanism by which a site can convey certificate revocation information to visitors in a privacy-preserving, scalable manner. Revocation information is important...
Top Bottom