It’s a rite of passage for many college students to run for student government office – particularly if they have grander political aspirations. But some take it just a tad too seriously (think Tracy Flick in “Election”). Take, for instance, the case o…
Java: Write Once, Pwn Anywhere
Just as a new report explains why Java vulnerabilities, despite Oracle’s best efforts, remain the hackers’ favored target, a Polish researcher discovers that the latest version, Java 7, is susceptible to a 10-year old attack.
Rex Mundi Hackers Post Data Stolen from Numericable
Numericable is a cable TV company operating in France, Belgium and Luxembourg. Rex Mundi claimed to have stolen customer data and demanded €22,000 for its return. Numericable declined, and denied that the hackers had the data.
Tumblr Patches its iOS App After Password Vulnerability
A brief statement from Tumblr late on Tuesday confirmed that its iPhone and iPad apps had been updated to patch “an issue that allowed passwords to be compromised [sniffed] in certain circumstances.”
GCHQ’s Use of NSA’s Prism Data is Legal, says UK
The legality of Prism in the US is a question for Congress and the US courts, says Sir Malcolm Rifkind, chairman of the UK’s all-party Intelligence and Security Committee – but the acquisition of Prism data by GCHQ is done legally.
Dirty AndroRAT: New Tool Lets Anyone Trojanize Android Apps
Malware authors are ever-adaptable, as evidenced by the rise of remote access tools (RAT) written in Java that are capable of running on multiple operating systems. The Android mobile operating system has made its way into the RAT crosshairs, with a ne…
Mobiquant Invited by Japanese Government to Exhibit at IT pro EXPO
The France-based mobile security specialist will participate in Japan’s leading IT innovation trade event to demonstrate its security solutions.
Water Hole Replacing Spear-Phishing as State-Sponsored Weapon of Choice
Spear-phishing is an attack that attempts to ensnare a specific individual or group of victims via email; water hole attacks wait for the victim to come to the trap. Attackers – especially state-sponsored attackers – are increasingly turning to the lat…
Verizon Hack Turns Femtocells into Mobile Spy Stations
Femtocells are nice-to-have mini-cells that boost cellular coverage indoors, to prevent consumers from going down to one, slow bar inside a house or store. Verizon Wireless offers femtocells for home use, but it turns out they can do more than supercha…
EXPIRO File Infector Variant Presents Unusual Threat Combo
A file infector malware recently discovered in the wild is exhibiting what security researchers are calling unusual characteristics stemming from an unexpected combination of threat techniques.