Blog Profile / Zero Day


URL :http://www.zdnet.com/blog/security/?tag=content%3bcol1
Filed Under:Technology / Security
Posts on Regator:2483
Posts / Week:6.4
Archived Since:February 3, 2010

Blog Post Archive

US border searches of phones and laptops have almost doubled

3 months agoTechnology / Security : Zero Day

But Homeland Security won't say why the number of searches has risen sharply, amid an ongoing effort by lawmakers to restrict warrantless searches at the US border.

Dangers of "reporting" open web and deep web chatter in the wake of terror attacks

3 months agoTechnology / Security : Zero Day

If media outlets, individual reporters, or simple watchers take the volume of open web or deep web chatter after terror attacks as evidence, then they will fall victim to bots and trolls -- and ultimately mislead their networks.

Recently patched Microsoft Word exploit was used by both governments and criminal hackers

3 months agoTechnology / Security : Zero Day

Researchers believe that the several attackers obtained the exploit from the same, original source.

Microsoft fixes 'critical' Office Word security flaw under active attack

3 months agoTechnology / Security : Zero Day

Researchers have seen the exploit being used in a large-scale email campaign to distribute the Dridex malware.

Hackers are attacking Word users with new Microsoft Office zero-day vulnerability

3 months agoTechnology / Security : Zero Day

The bug affects all supported versions of Microsoft Word, including users of Windows 10.

New bill aims to ban warrantless phone searches at the US border

4 months agoTechnology / Security : Zero Day

The bipartisan bill would force US border officials to obtain a warrant before searching devices belonging to a US person.

Cybercriminals ignore individuals, focus on holding the enterprise to ransom

4 months agoTechnology / Security : Zero Day

More threat actors than ever are spending their time and effort on forcing businesses to pay up through encryption ransomware.

Wassenaar Arrangement: When small words have the power to shatter security

4 months agoTechnology / Security : Zero Day

Katie Moussouris explains why a battle over wording could break the Internet's ability to defend itself.

Have security conferences become an 'army of noise'?

4 months agoTechnology / Security : Zero Day

Of the hundreds of security conferences, the vast majority are interchangeable in terms of content. Some up-and-coming events are reducing the noise, providing better opportunities for learners, and booking fresh faces on the main stage.

ATM hackers release cold, hard cash at the click of a remote button

4 months agoTechnology / Security : Zero Day

The ATMitch heist has shown attackers are now able to remotely create an ATM tunnel to financial reward with little effort.

Skype users hit by ransomware through in-app malicious ads

4 months agoTechnology / Security : Zero Day

Several users have complained about "fake Flash" ads which if triggered can lead to a ransomware attack.

Windows zero-day affects 600,000 older servers, but likely won't be patched

4 months agoTechnology / Security : Zero Day

The security vulnerability is publicly exploitable, but Microsoft only fixes "currently supported versions."

Congress just obliterated Obama-era rules preventing ISPs from selling your browsing history

4 months agoTechnology / Security : Zero Day

The rules, which were set to go into effect but were blocked by a Republican-controlled FCC chairman, were ruled on in Congress, nuking them from ever going into effect.

FBI, CIA launch investigation into Wikileaks file dump

4 months agoTechnology / Security : Zero Day

The US agencies say the release of CIA documents to the public should be considered "deeply troubling."

Confide, a messaging app used by White House staff to leak, isn't very secure

4 months agoTechnology / Security : Zero Day

Two security firms have found multiple vulnerabilities, including one that allows the interception of secure messages — defeating the whole point of the encrypted messaging app.

How to lock up your digital life in less than an hour

4 months agoTechnology / Security : Zero Day

Follow this simple checklist of best practices to protect your privacy and information without spending a cent.

StoneDrill wiper malware targets European hard drives

4 months agoTechnology / Security : Zero Day

The new wiper malware is joining Shamoon in attacks against the Middle East and Europe.

'Cloudbleed' post-mortem points to huge data leak, but no evidence of exploitation

5 months agoTechnology / Security : Zero Day

The networking giant Cloudflare didn't underplay the severity of the bug, but did downplay the scope in which users' encrypted data may have been inadvertently exposed over the past six months.

Copyright © 2015 Regator, LLC