Blog Profile / Zero Day


URL :http://www.zdnet.com/blog/security/?tag=content%3bcol1
Filed Under:Technology / Security
Posts on Regator:1509
Posts / Week:5.6
Archived Since:February 3, 2010

Blog Post Archive

Zero Day Weekly: Lenovo's poison Superfish, Netgear vuln, SIM card spying, Obama's encryption follies

A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.

Lenovo's Superfish spectacle: 'Catastrophic' security failures discovered

Superfish isn't just adware -- it can also be a nightmare for those who value their privacy.

Any regrets, Edward Snowden? "I'd have come forward sooner"

The former NSA contractor turned whistleblower said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.

Lenovo works on 'cleaner PC image' following Superfish debacle

Lenovo is still smarting from the Superfish media storm, but CTO Peter Hortensius says the firm is working to fix its battered reputation.

Hackers impersonating IT staff popular tactic in data breaches, FireEye finds

FireEye's Mandiant M-Trends report says impersonation and social engineering are now key tactics used by cybercriminals targeting corporations.

Gemalto SIM card encryption hack: Key questions remain

A Wednesday press conference will aim to quell fears that the UK and US intelligence agencies have unfettered access to our mobile devices and phone calls.

China wants Silicon Valley's encryption keys: Good business, or get out?

China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out.

How to send encrypted messages to iOS, Android devices for free

While Silent Circle's encrypted devices and services look tempting, there are now end-to-end encryption services on the market available without spending a cent.

Health insurance hack hit up to 19M non-Anthem customers

The health insurance company said that millions of people who weren't enrolled in its services were affected by a hack earlier this year.

Gazon: Mobile malware outbreak strikes Android devices

AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.

Over 1 million WordPress websites at risk from SQL injection

A critical security flaw in a plugin called WP-Slimstat is to blame.

CloudFlare boosts browsing privacy, speed through encryption deployment

CloudFlare has gone beyond offering free SSL to millions of websites and is now deploying a new level of encryption by default.

Ramnit botnet assaulted by Europol operation

Europol and international law enforcement agencies have disrupted the activities of a botnet thought to have infected 3.2 million computers worldwide.

Facebook's bug bounty program paid out $1.3 million in 2014

Facebook has doled out roughly $3 million since it launched the bug bounty program in 2011.

Google reverses its promise to enable encryption by default in Android Lollipop

The search giant will let phone makers decide whether or not to enable encryption-by-default, saying it will be considered for "future" versions of Android.

Meet the free encryption app that promises to put your privacy first

The Cryptocat developer's new team aims to get easy file and message encryption into everyone's hands, which could give Gmail and Dropbox (and the NSA) a run for their money.

AVG unveils invisibility glasses to defend against facial recognition

Could 'invisibility' glasses become the next trend in cities crawling with cameras and full of facial recognition technology?

It's official: NSA spying is hurting the US tech economy

China is backing away from US tech brands for state purchases as NSA revelations continue to make headlines in newspapers all around the world.

New iPhone or iPad? Change these iOS 8 privacy settings immediately

Before you sync your iCloud or reinstall your apps, you need to lock down your new iPhone or iPad. Here are the important tweaks you need to protect your privacy.

Copyright © 2015 Regator, LLC