Blog Profile / Zero Day


URL :http://www.zdnet.com/blog/security/?tag=content%3bcol1
Filed Under:Technology / Security
Posts on Regator:2431
Posts / Week:6.4
Archived Since:February 3, 2010

Blog Post Archive

Seized Silk Road bitcoin used to fund Shadow Brokers exploit auction

8 months agoTechnology / Security : Zero Day

It may be that the US government is keen to stop the exploit cache from ending up in external hands.

Californian woman sent behind bars for trying to sell US fighter jet tech to China

8 months agoTechnology / Security : Zero Day

The 45-year-old worked with a Chinese associate to find buyers for items including high-tech jet engines.

Snowden documents confirm that leaked hacking tools belong to NSA

8 months agoTechnology / Security : Zero Day

Documents suggest a smoking gun between the US intelligence agency and the malware it allegedly developed.

Wikileaks hosts hundreds of malware files in email dumps

8 months agoTechnology / Security : Zero Day

The confidential file publisher has not considered the security implications of mass email uploads, it seems.

Bitcoin.org suspects state-sponsored attacks on the horizon

8 months agoTechnology / Security : Zero Day

Bitcoin traders have been warned that the upcoming Bitcoin Core software release will become a top target for well-funded hacking groups.

Millions of Steam game keys stolen after hacker breaches gaming site

8 months agoTechnology / Security : Zero Day

The data also includes an estimated 3.3 million unique site and forum accounts.

Vulnerable smart home IoT sockets let hackers access your email account

8 months agoTechnology / Security : Zero Day

The smart plug can act as a conduit not just for electricity -- but for cyberattacks.

Sage employee arrested at airport following data breach

8 months agoTechnology / Security : Zero Day

The 32-year-old was apprehended at Heathrow Airport, London.

Google's Santa macOS malware sniffer goes open source

8 months agoTechnology / Security : Zero Day

The tool's development is underway with the overall aim of becoming a potent whitelisting app for Mac machines.

?PGP security weakness exposed

8 months agoTechnology / Security : Zero Day

If you're still using 32-bit PGP keys, you only think you have security. But you really don't. It would take a cracker about four seconds to forge your PGP signature.

Bad weather blamed for knocking NSA's website offline for two days

8 months agoTechnology / Security : Zero Day

But the timing couldn't have been worse for speculation to explode.

US Dept of Energy spends $34m on securing the smart grid

8 months agoTechnology / Security : Zero Day

The funds are being poured into new, innovative ways to keep our critical infrastructure safe from cyberattack.

US wiretap numbers still don't add up, and nobody knows why

8 months agoTechnology / Security : Zero Day

Verizon, AT&T, T-Mobile, and Sprint reported almost three-times the number of wiretaps that were listed in the government's official report.

Hacker wins $5,000 for Chrome, Firefox address bar spoofing flaw

8 months agoTechnology / Security : Zero Day

The "omnibox" vulnerability makes it easier to phish or steal user's data.

Shadow Brokers launch auction for Equation Group hacking cache

8 months agoTechnology / Security : Zero Day

Whether the auction is truly placing the NSA-tied Equation Group's exploit tools for sale or whether this is an elaborate hoax is still unknown.

Alleged Silk Road "Libertas" site admin to be extradited to US

8 months agoTechnology / Security : Zero Day

The Irish 27-year-old could face life in prison in the United States.

T-Mobile reveals small rise in government demands for customer data

8 months agoTechnology / Security : Zero Day

But the number of secret national security requests went down during the period.

Linux traffic hijack flaw also affects most Android phones, tablets

8 months agoTechnology / Security : Zero Day

About 80 percent of all Android devices are affected, but "exploitability is hard."

20 top US hotels hit by fresh malware attacks

8 months agoTechnology / Security : Zero Day

If you've stayed at these hotels and have taken out your credit card at shops, bars or restaurants, your financial data may be at risk.

Copyright © 2015 Regator, LLC