This week, the NSA finally (and voluntarily) served up their first piece of humble pie after a year-and-a-half of near total silence on the matter of their own internal advisory practices and oversight.
The term ‘brute force attacks’ conjures up many images. A battering ram being heaved at the door of a castle. An army from ancient Rome 86,000 strong taking on Hannibal at Cannae. Any number of scenes from Game of Thrones… Yes, the visuals are vivid, but since we’re talking Internet security here, they’re fairly far Read More
Researchers have identified a new vulnerability affecting Linux-based operating systems – the Grinch bug. By exploiting this vulnerability, hackers can gain root access to a system running on Linux.
Scammers have come up with a new virus scare, C93, which targets users of Microsoft Windows Outlook and is aimed at stealing their login details. In this fresh scam, hackers have released a fake C93 virus that targets the users of Windows Outlook. It begins with a phishing email that seems to be coming from Read More
This Thursday, allegations surfaced suggesting that the privacy-centric social media app Whisper had been tracking user information, logging GPS locations, and handing over sensitive data to law enforcement without the knowledge or permission of its users. Whisper, the social media app which prides itself first and foremost on user privacy, has been steadily gaining traction Read More
In one of the more “Inception-esque” exploits this side of 2014, the security outfit CheckPoint Security have announced they have discovered a crack in Mozilla’s Bugzilla bug reporting software which allowed anyone who knew their way in the ability to view and record all the latest bugs that were appearing in system-wide version revisions of Read More
New documents leaked from the Snowden camp have revealed a plot by the NSA and GCHQ to create a map of every device connected to the Internet at any given time. This means that every desktop, laptop, tablet, and cell phone would be carefully logged and traced on an industrial level, so that agents could Read More
“If one does not consider the long-range future, one will never cease to be surprised.” In this context the Director of National Intelligence introduced the US Intelligence Community’s most recent Quadrennial Intelligence Community Review (QICR), published in 2009. Deputy Director of National Intelligence David R. Shedd. Photo: Wikimedia Commons It is the most recent of Read More
The Wall Street Journal has reported that the United States healthcare portal Healthcare.gov was breached and infiltrated by a lone hacker, who implanted his own customized malware program onto the government network back in July of this year. So far the attack itself looked to have been relatively innocuous, as the hacker was only able Read More
Do SQL injections still work? It seems that this old-school hacking technique is very much alive and can be used for a major data breach. The UK Information Commissioner’s Office (ICO) has warned companies to stay safe against SQL injection attacks after a hacker used this technique to steal the records of 677,335 customers of Read More