Security

Last Updated on 14 Nov. 2014, Total: 49 Blog Posts

  1. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  2. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

  3. How Secure is TextSecure?

    Security researchers from the German Gortz Institute for IT Security (Ruhr University Bochum) present the first complete description of TEXTSECURE’s complex cryptographic protocol and a thorough security analysis of TEXTSECURE... Read More

  4. Nearly 3 in 4 IT Professionals Report that SIEM Solutions Don’t Reduce Security Incidents

    Netwrix survey of 800 IT professionals finds that the majority of companies still don’t have complete visibility into what is going on across their IT infrastructures... Read More

  5. Data Breaches in Europe

    Reported Breaches of Compromised Personal Records in Europe, 2005‐2014... Read More

  6. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  7. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  8. What is PoS malware?

    PoS terminals are among the most vulnerable spots in retailers’ infrastructure for a number of technical reasons... Read More

  9. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  10. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

Featured Links