A brief statement from Tumblr late on Tuesday confirmed that its iPhone and iPad apps had been updated to patch “an issue that allowed passwords to be compromised [sniffed] in certain circumstances.”
GCHQ’s Use of NSA’s Prism Data is Legal, says UK
The legality of Prism in the US is a question for Congress and the US courts, says Sir Malcolm Rifkind, chairman of the UK’s all-party Intelligence and Security Committee – but the acquisition of Prism data by GCHQ is done legally.
Dirty AndroRAT: New Tool Lets Anyone Trojanize Android Apps
Malware authors are ever-adaptable, as evidenced by the rise of remote access tools (RAT) written in Java that are capable of running on multiple operating systems. The Android mobile operating system has made its way into the RAT crosshairs, with a ne…
Mobiquant Invited by Japanese Government to Exhibit at IT pro EXPO
The France-based mobile security specialist will participate in Japan’s leading IT innovation trade event to demonstrate its security solutions.
Water Hole Replacing Spear-Phishing as State-Sponsored Weapon of Choice
Spear-phishing is an attack that attempts to ensnare a specific individual or group of victims via email; water hole attacks wait for the victim to come to the trap. Attackers – especially state-sponsored attackers – are increasingly turning to the lat…
Verizon Hack Turns Femtocells into Mobile Spy Stations
Femtocells are nice-to-have mini-cells that boost cellular coverage indoors, to prevent consumers from going down to one, slow bar inside a house or store. Verizon Wireless offers femtocells for home use, but it turns out they can do more than supercha…
EXPIRO File Infector Variant Presents Unusual Threat Combo
A file infector malware recently discovered in the wild is exhibiting what security researchers are calling unusual characteristics stemming from an unexpected combination of threat techniques.
Goofing off at Work Can Lead to Malware Infections and Data Breaches
Surveys show that employees spend up to 30% of their working hours on private affairs. And all of those non-productive hours could translate to not just lost output, but actual negative equity in the form of malware attacks and hacking incidents.
Half-Life 3 Confirmed!
Half-Life is a popular game developed by Valve and available on the Steam gaming platform. Enthusiasts of Half-Life 2 have been waiting years for the next installment; long wanted but never delivered. Despite the ‘confirmation’, it still isn’t.
Governments are Big Buyers of Zero-Day Flaws
The extent and sophistication of the market for zero-day vulnerabilities is becoming better understood. It appears that governments – especially the US, UK, Israel, Russia, India and Brazil – are among the biggest customers.