Posts Tagged "Attackers" (Page 2)

Attackers

Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking library. The …

The ongoing audit of the TrueCrypt whole-disk encryption tool used by millions of privacy and security enthusiasts has reached an important milestone—a detailed review …

A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found. The …

A combination of new malware and old-fashioned social engineering has been used to rob companies of more than US$1 million, according to a new …

The operator of an underground marketplace hosted within the Tor network has reported a flaw in Tor that he claims is being used for …

A vulnerability in fully patched versions of Internet Explorer allows attackers to steal login credentials and inject malicious content into users’ browsing sessions. Microsoft …

Last week, PC maker Lenovo was called out for shipping laptops with adware, called “Superfish,” pre-installed – an incident that led Facebook to investigate …

The serial port interfaces of nearly 6,000 automated tank gauges (ATG) — 5,300 of them in the U.S. — aren’t password protected, leaving them …

This week, FBI director James Comey offered new information on the Sony Pictures hack in hopes of easing public doubts about the bureau’s claim …