Archive for the ‘Featured’ Category

Gang Up on the Problem, Not Each Other

November 17th, 2016

The security community often thrives on controversy, but when it comes to vulnerability disclosures in life-saving medical devices, ego and attention-grabbing must be put aside.

Posted in Embedded Device Security, Featured, Internet of things, IoT security, Medical device security, MedSec, Muddy Waters, St. Jude vulnerabilities, Threatpost Op-Ed, vulnerabilities, Vulnerability Disclosure | Comments (0)

WordPress Update Resolves XSS, Path Traversal Vulnerabilities

September 8th, 2016

Developers with WordPress are strongly encouraging users of the content management system to update to the most recent version, 4.6.1, released on Wednesday.

Posted in Cross site scripting, Featured, Path traversal vulnerabilities, vulnerabilities, Web Security, WordPress, WordPress updates, XSS | Comments (0)

Yelp Launches Public Bug Bounty

September 6th, 2016

Yelp today announced a public bug bounty, which will pay up to $15,000 for critical vulnerabilities found on its mobile and desktop sites, public API and other areas of its infrastructure.

Posted in bug bounty, Featured, HackerOne, Martin Georgiev, private bug bounty, public bug bounty, vulnerabilities, Web Security, Yelp | Comments (0)

RIPPER ATM Malware Uses Malicious EMV Chip

August 29th, 2016

RIPPER malware forces ATMs to churn out cash for crooks via a malicious EMV bankcard attack.

Posted in ATM hack, ATM malware, EVM, Featured, RIPPER malware, Skimer | Comments (0)

Security blogger Graham Cluley’s website suffers DDoS attack

November 12th, 2015

Former Naked Security writer Graham Cluley was the latest to fall victim to a DDoS attack on his website this week.

Posted in armada collective, Botnet, DDoS, Denial of Service, Featured, Graham Cluley, Lizard Stresser, ProtonMail, ransom, Security threats | Comments (0)

IT pros, tell us your top security concerns and maybe win some chic swag!

November 6th, 2015

Work in IT? We want to hear from you! Take part in our one-minute (yes, really) security survey and you might win geektastic swag of your choice.

Posted in Featured, infosecurity, IT, Security threats, survey | Comments (0)

vBulletin enforces password reset after website attack

November 4th, 2015

vBulletin and Foxit Software forums hack exposes hundreds of thousands of records amid zero-day vulnerability speculation.

Posted in Data leak, data loss, Featured, password, vbulletin, Zero-Day Vulnerability | Comments (0)

Critical Xen vulnerability went undiscovered for seven years

November 2nd, 2015

An extremely serious vulnerability in Xen hypervisor software that would have allowed an attacker to escape their virtual machine and take over a host computer went undiscovered for seven years.

Posted in advisory, CVE-2015-7835, Featured, hypervisor, Security threats, Vulnerability, xen | Comments (0)

Young people – particularly women – aren’t hearing about cybersecurity jobs

October 30th, 2015

Schools aren’t preparing them, nobody’s telling them about job opps, and fewer young women want to go into the field.

Posted in Featured, National Cyber Security Alliance, Raytheon, Security threats, study | Comments (0)

SXSW turns tail and runs, nixing panels on harassment

October 28th, 2015

The festival bowed down to the hecklers, copping out after receiving multiple threats of violence.

Posted in Featured, gamergate, SXSW, trolls | Comments (0)