Charlie Miller, computer security researcher at Twitter, declared mobile threats “all hype” despite media headlines suggesting that they are a number one security concern.
F-Secure’s Threat Report H1 2013
F-Secure’s Threat Report for the first half of 2013 says that threat vectors have remained similar but got worse over the first half of this year. Watering hole attacks and mobile malware are good examples.
IE 0-Day Probably Tied to the Hidden Lynx Hacking Group
Last week Microsoft issued a warning on a new zero-day exploit being used in targeted attacks. On the same day researchers published details on the Hidden Lynx hacking group. Now new research ties the IE 0-day to those same hackers.
SafeGov Calls for Greater Controls Over the Use of Google Services in European Schools
The low cost of Chromebooks coupled with the ‘free’ use of Google Apps and their in-built capacity for collaborative work threatens to revolutionize computing in schools. But SafeGov is warning that it may come at the unacceptable cost of the privacy o…
Chaos Computer Club First to Hack Apple Touch ID
In a stinging rebuke on the concept of fingerprint security, Germany’s Chaos Computer Club hacks the iPhone 5s fingerprint access and claims “that fingerprint biometrics is unsuitable as access control method and should be avoided.”
Shylock Malware Surges to Target Vast Swath of Banking Sector
A resurgence of the Shylock/Capshaw banking threat has hit banks across the EU again, as well as several top US banks. In all, Capshaw is this time being found to affect at least 24 financial institutions.
NCC Group CEO Completes 600km Mountain Cycle for Charity
Eight leading North West businessmen, including Rob Cotton, CEO of NCC Group, celebrated an epic success this week, raising over £210,000 to date for The Christie NHS Trust while beating the hardest stages of the Tour de France route in the process.
FireEye Goes Public; Trading on NASDAQ Expected Today
Market confidence in Silicon Valley is rising again. While Twitter has announced plans for an IPO, FireEye has proceeded with its own, selling more shares at a higher price than at first intended.
RSA Says Don’t Use NIST Crypto Algorithm
Last week NIST recommended that its elliptic curve specification ‘no longer be used.’ Now, in an email advisory sent to customers, RSA strongly recommends that developers discontinue use of Dual EC DRBG and move to a different PRNG.
Apple iOS 7: A Security Overview
Apple’s new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.