Breaking News




Source: Veracode.com

Sep 21, 2016
It's not what you say, but how you say it. That piece of advice, which has given to countless politicians and executives over the decades, might be the premise behind an intriguing knew approach to biometric authentication. Although to be precise, it's closer to "It's not what you type, but how you type it." The value of any authentication system is based on a balancing act. How accurate an id...


Source: Ars Technica Security RSS

Sep 21, 2016
Researchers from Tencent's Keen Security Labs totally hack the Tesla S over Wi-Fi. Security researchers at the Chinese Internet company Tencent's Keen Security Lab privately revealed a security bug in Tesla Model S cars that allowed an attacker to achieve remote access to a vehicle's Controller Area Network (CAN) and take over functions of the vehicle while parked or moving. The Keen ...


Source: Ars Technica Security RSS

Sep 21, 2016
Enlarge / This is how we used to mess with the results of elections. The Internet has made it a lot easier. (credit: US Air Force photo) Even if the Russian government was behind the hack of the Democratic National Committee (DNC) and various other political organizations and figures, the US government's options under international law are extremely limited, according to Jack Goldsmith, a Ha...


Source: Kaspersky (securelist.com)

Sep 20, 2016
In the past, we’ve seen superuser rights exploit advertising applications such as Leech, Guerrilla, Ztorg. This use of root privileges is not typical, however, for banking malware attacks, because money can be stolen in numerous other ways that don’t require exclusive rights. However, in early February 2016, Kaspersky Lab discovered Trojan-Banker.AndroidOS.Tordow.a, whose creators decided that ...

Enlarge (credit: The Dark Knight, Warner Bros.) Finance messaging giant SWIFT plans new measures to help banks combat fraud, after a gang broke into Bangladesh's central bank in February and stole £57 million pounds—and were only caught because one of them made a typo in a £15 million transfer. The banking communications network, which allows financial institutions across the world to send e...


Source: Ars Technica Security RSS

Sep 20, 2016
Enlarge (credit: Sergei Skorobogatov/YouTube) Passcodes on iPhones can be hacked using store-bought electronic components worth less than $100 (£77), according to one Cambridge computer scientist. Sergei Skorobogatov has demonstrated that NAND mirroring—the technique dismissed by James Comey, the director of the FBI, as unworkable—is actually a viable means of bypassing passcode entry limits...

The adventurous hero is a common thread in mythology that helps us understand what makes someone great. From Homer’s Odysseus, to George Lucas’s Luke Skywalker, all mythical heroes have traits in common and follow a similar path. Heroes don’t start out that way – they need to prove their mettle by undertaking a long journey and passing a series of tests. The hero must look within him or hersel...

Enlarge Mozilla officials say they'll release a Firefox update on Tuesday that fixes the same cross-platform, malicious code-execution vulnerability patched Friday in the Tor browser. The vulnerability allows an attacker who has a man-in-the-middle position and is able to obtain a forged certificate to impersonate Mozilla servers, Tor officials warned in an advisory. From there, the attacke...