FROST: Forensic Recovery Of Scrambled Telephones

FROST: Forensic Recovery Of Scrambled Telephones

Recovering contents directly from physical RAM of devices has been known for quite some time – it involves esoteric measures...

Unauthorized code in Juniper ScreenOS allows for administrative access

This is bad. Juniper is a major network equipment provider and a backdoor like this could lead to huge security...

Let’s Encrypt – Entering Public Beta

Let’s Encrypt – Entering Public Beta

Let’s Encrypt goes public beta. No more paying of ridiculous amounts for a simple SSL certificate. Yearly. The process is...

w00tsec: ARRIS Cable Modem has a Backdoor in the Backdoor

w00tsec: ARRIS Cable Modem has a Backdoor in the Backdoor

Yet another reason why device firmware must be made open source. This could create a botnet of potentially 600,000 nodes....

Malware Found Pre-Installed on Xiaomi, Huawei, Lenovo Phones

Another reason to be wary of cheap mobile phones, especially those from dubious physical or online shops. See full report...

Who Hacked Ashley Madison? — Krebs on Security

Who Hacked Ashley Madison? — Krebs on Security

Well, can we say schadenfreude? The hunter becomes the hunted. Source: Who Hacked Ashley Madison? — Krebs on Security

DefCon Hackers Tell How They Cracked Brink’s Safe in 60 Seconds

DefCon Hackers Tell How They Cracked Brink’s Safe in 60 Seconds

A safe with an exposed USB port? That’s really asking for trouble. The safe in question is a “secure” digital...

Major Flaw In Android Phones Would Let Hackers In With Just A Text : All Tech Considered : NPR

Major Flaw In Android Phones Would Let Hackers In With Just A Text : All Tech Considered : NPR

Android users please take note. This time you don’t even have to download anything or visit any malware website to...

Hacking Team: a zero-day market case study

Singapore’s connection to the Hacking Team – it’s well known that HT has a Singapore presence. The local market appears...

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17