Blog Profile / Zero Day

Filed Under:Technology / Security
Posts on Regator:1451
Posts / Week:5.5
Archived Since:February 3, 2010

Blog Post Archive

California AG on data breaches: Companies should encrypt data

In 2012, around 2.5 million Californians were victim of a corporate data breach. But more than half of those affected could've been protected had their data been encrypted.

Latest NSA leak details PRISM's bigger picture

Another leaked batch of top secret slides relating to the U.S. National Security Agency's PRISM data collection program sheds further light on how non-U.S. data is collected from various tech firms, and how under law U.S. data is filtered out — albeit not always.

Norton: Android app skips consent, gives Facebook servers user phone numbers

Norton published findings that Facebook's Android app has sent millions of people's phone numbers to its servers upon launch, without users even logging into the app.

Cisco fixes Web, email, content security appliance vulnerabilities

The networking giant has fixed a number of vulnerabilities that could allow hackers to remotely execute commands or disrupt critical processes.

South Korea hacks blamed on 'Dark Seoul Gang'

A four-year hacking spree inflicted on South Korea is apparently down to a single hacking group called the "Dark Seoul Gang."

HP enterprise storage systems suffer 'secret' admin account flaw

The computer and server maker is working hard on a fix to a security flaw in one of its enterprise systems, that could allow unauthorized access to corporate data.

Firm: Facebook 'bug' worse than reported; non-users also affected

According to the firm who found the bug, Facebook's email to six million users affected by its shadow profiles leak left out some numbers - and non-user contacts were also leaked.

The top ten most common database security vulnerabilities

What are the most common, and serious, database vulnerabilities that businesses should be aware of?

Google adds malware site flags to Transparency Report

Have you see those "warning" pages Google throws up when you're about to hit a malware-infested site? The search giant is now adding those flagged figures to its ongoing disclosure report.

Skype ditched peer-to-peer supernodes for scalability, not surveillance

Before Microsoft acquired Skype in 2011, the voice calling service was already ditching its "near impossible to wiretap" peer-to-peer model in favor of the cloud.

NSA instigates security measures to hamper future whistleblowers

A new "two-man rule" will be put into place to stop administrators from having access to entire governmental systems.

Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone

The security researchers who found Facebook's 'shadow profiles' bug have rung the alarm that Facebook is compiling "frightening" dossiers on everyone possible.

Anger mounts after Facebook's 'shadow profiles' leak in bug

Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its 'shadow profile' data collection activities, and users are furious.

Secret NSA documents on data collection appear more relaxed than first told

More secret and classified materials have been leaked by a U.K. newspaper. This time, the top secret guidelines that authorizes data collection of "non-U.S. persons" are on show.

Film: High risk reporting along China's Great Firewall in High Tech, Low Life

Eagerly-awaited documentary High Tech, Low Life released this week online. The film chronicles life on the edge for two bloggers under China's increasing surveillance and propaganda directives.

Microsoft unleashes bug bounty program — for betas, too

The software giant's bug bounty program will aim to fix security flaws, bugs, and vulnerabilities even before products are released.

Oracle releases latest round of Java security patches

Oracle has released critical patch updates containing 40 security fixes across Java SE products.

BlackBerry issues 'critical' security warning for Z10 phones

The first flagship BlackBerry 10 phone contains a "critical" bug that could allow hackers to crack open the device and pilfer files and data.

NSA can allegedly listen to phone calls without warrants: report

AMENDED: In a classified briefing, the U.S. National Security Agency confirms that it can and does listen to phone calls of both U.S. residents and foreign nationals — without needing a court order, according to a report.

Ad exec: Online ad industry complicit in NSA PRISM datamining

A leading figure in digital advertising says the ad industry is complicit in the NSA mass-data spying program, PRISM.

Copyright © 2015 Regator, LLC