Information Security

Jira bug exposed private server keys at major companies, researcher finds

A major TV network, a UK cell giant, and one US government agency are among the companies affected.<p>Several tech giants and major companies are …

Security

FireEye Offers Free Tool to Detect Malicious Remote Logins

Open source GeoLogonalyzer helps to weed out hackers exploiting stolen credentials to log into their targets.<p>FireEye today released an open source …

Security

Changes to PCI Compliance are Coming June 30. Is Your Ecommerce Business Ready?

In 2015, the Payment Card Industry (PCI) updated their standards for encrypting online and ecommerce transactions. For years the SSL and TLS 1.0 protocols were enough, but as hackers have gotten savvier the industry has been forced to adapt. To that end, businesses processing payments online must …

eCommerce

Best Active Directory Tools (FREE) for AD Management & Administration

We've compiled a MASSIVE List of the Best (and Free) Active Directory Tools for Windows admins that will help with any of your Auditing, Reporting …

Security

Remote Code Execution Vulnerability Disclosed in Windows JScript Component

A vulnerability exists in the Windows operating system's JScript component that can allow an attacker to execute malicious code on a user's …

Security

New vulnerabilities give cybercriminals 7 days to compromise your network

Cybercriminals have a 7-day window of opportunity to use vulnerabilities against a target Web site before their activity is likely to be detected or …

Security

Google patches reCAPTCHA bypass vulnerability

The security flaw allowed attackers to circumvent the reCAPTCHA bot protection system.<p>Google has resolved a security vulnerability in reCAPTCHA which …

Security

US issues warning about North Korean malware

Security Editor<p>Follow:<p>The US Computer Emergency Readiness Team (US-Cert) has issued a technical alert about two families of malware used by the North …

Cybersecurity

Malicious Git repos could see an attacker remotely execute code on your system

If you use Git, it’s time to update it. Like, now.<p>The latest version of the popular source management software addresses two frightening bugs, which could see an attacker execute their own arbitrary code on a victim’s computer, should the latter clone a malicious repository.<p>The first bug has a CVE …

Tech Trends

If there's something strange in your CPU, who you gonna call?

Enhanced Spectre-protectors will soon come to the Chrome browser, as its desktop stable channel hit version 67.0.3396.62 and upgrades for Windows, …

Security

SEVered attack able to defeat AMD SEV

Several German researchers have shown a proof of concept attack indicating virtual machines using AMD's secure encrypted virtualization (SEV) are …

Security

Contractor Exposes Credentials for Universal Music Group's IT Infrastructure

Keys to the Universal Music Group's IT kingdom were made available online this month due to a forgetful IT contractor, Bleeping Computer has …

Security

Microsoft Patch Alert: Major bugs introduced in May fixed, plenty of problems remain

Once more we have a monthly Windows/Office patch scorecard that needs a guidebook. Or two. And we just got a handful of buried warnings about …

Technology (Australia)

Smart speakers are vulnerable to a variety of attacks

For the most part, AI-powered smart speakers like Google Home, Amazon’s Echo, and Apple’s HomePod are relatively innocuous. They stream music and internet radio, highlight upcoming calendar events, place takeout orders, provide up-to-date weather forecasts, and more. But as this month’s incident …

Business

Windows 'Double Kill' Attack Code Found in RIG Exploit Kit

Microsoft issued a fix for the remote code execution zero-day vulnerability in May, but research shows businesses have slowed their patching …

Cybersecurity

The FBI Says Your Router Is Vulnerable to Russian Hackers. Here’s What to Do

It's real easy.<p>What are you doing right now? Nothing? Good. Go find your router, that little flat black box that gives you wireless internet access, …

Routers

Authenticated encryption and OpenSSL keys

So the main question is "can I store an OpenSSL private key (specifically an RSA private key) using authenticated encryption?".<p>OpenSSL supports a …

Heartbleed Bug

Open ports left over 1,000 SingTel routers vulnerable to cyber-attacks

More than 1,000 owners of Wi-Fi routers were left exposed to potential cyber-attacks after Singapore Telecommunications Limited forgot to secure port …

Security

The anatomy of an RCE: Are open-source vendors repeating app sec mistakes?

As a researcher for the Micro Focus software security research team working on Fortify, I need to keep up to date with vulnerabilities in Java …

Security

6 Steps To Secure Cryptographic Keys | Articles | Big Data

Cryptocurrency seems to bring out the best effort from cybercriminals. From nation states to traditional attackers, the rise in crypto-related …

Security

How to fix SSL certificate error when running Npm on Windows?

When I try to install a package with npm, it doesn't work. After a long wait, I eventually get an error 'tunneling socket could not be established, …

Security

Google Updates Chrome With Security Fixes And VR/AR Support

Image: Google<p>The latest stable release of Google Chrome is now available. Version 67 of Chrome includes 34 security fixes as well as several …

Google Chrome

Remote Code Execution Vulnerability Patched in Git

<b>Updates released on Tuesday for the Git version control system patch two security flaws, including a serious vulnerability that can be exploited for</b> …

Security

Hacker Sentenced to 5 Years in Yahoo Credential Theft Case

Karim Baratov given prison time and seven-figure fine after guilty plea in the massive Yahoo data breach<p>One of the most prominent computer hacking …

Security

Digital Transformation: Enterprise Key Management and Protection in a Connected World

As corporate IT becomes more digital and dispersed, security functions that leverage cryptography - data encryption, digital signing, and …

Encryption

EOS Bug Bounty Launch Raises Questions From Industry Experts

The mainnet launch of EOS is inching closer. As such, the developers want to ensure there are no lingering bugs or fatal flaws for hackers to …

Bitcoin

Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System

In less than one month, security researchers participating in the Pentagon's Hack the Defense Travel System program found 65 …

Security

Data signed on iOS can't be verified in Java

I have some data that I'm signing on iOS with SecKeyRawSign using Elliptic Curve private key. However, verifying that data in Java using …

Security

Machine Learning, Artificial Intelligence the Future of Cybersecurity

The ability to learn gives security-focused AI and ML apps unrivaled speed and accuracy over their more basic, automated predecessors. But they are …

Artificial Intelligence

Open Source Tool From FireEye Helps Detect Malicious Logins

<b>FireEye has released GeoLogonalyzer, an open source tool that can help organizations detect malicious logins based on geolocation and other data.</b><p>Many …

Security