Blog Profile / Zero Day

Filed Under:Technology / Security
Posts on Regator:1519
Posts / Week:5.6
Archived Since:February 3, 2010

Blog Post Archive

Amid extended Apple developer site downtime, users report unauthorized password resets

Apple's developer site has been down for two days. Some have experienced password reset emails, which appear to be sent by Apple, but were not authorized — suggesting foul play.

Verizon's secret data order timed to expire, but NSA spying to carry on

The secret order that authorized snooping on millions of Americans was set to expire. But was it not inevitable that the order would be renewed before it ran out, just as it was before?

U.K. gov't data snooping demands spike by 16 percent

U.K. police and government agencies' demands for data snooping rose by 16 percent to more than a half-million requests for citizen data in 2012 as a result of the Olympics in London.

U.K. gov't to review Huawei's role at cybersecurity testing center

The review was confirmed after a parliamentary report raised concerns that security testers working at the Oxfordshire cybersecurity center were paid by Huawei.

Google patches Glass hijack vulnerability

Google Glass faced its first security vulnerability in the form of a QR code that allowed a hacker to take over the wearable computer.

U.K. spy agency didn't break the law amid PRISM claims, MPs say

Signals intelligence agency GCHQ didn't break British laws when conducting its mass surveillance program in conjunction with the Americans, but MPs are instead looking at whether the laws should be updated.

Microsoft: We do not give the NSA keys to bypass email encryption

Microsoft says it does not provide the NSA or any U.S. government agency with the ability to bypass its encryption or give 'direct access' to user data.

EFF sues NSA over warrantless government spying program

The privacy group, representing 19 diverse groups — including a gun rights groups and a Los Angeles church — claim the NSA's PRISM and fiber cable spying program violates their constitutional rights.

July's Patch Tuesday to fix six critical Windows, Office, IE security vulnerabilities

Prepare for a bumpy ride for July's roundup of Patch Tuesday updates, Microsoft warns, with critical flaws for almost every version of Windows running every bit of hardware.

California AG on data breaches: Companies should encrypt data

In 2012, around 2.5 million Californians were victim of a corporate data breach. But more than half of those affected could've been protected had their data been encrypted.

Latest NSA leak details PRISM's bigger picture

Another leaked batch of top secret slides relating to the U.S. National Security Agency's PRISM data collection program sheds further light on how non-U.S. data is collected from various tech firms, and how under law U.S. data is filtered out — albeit not always.

Norton: Android app skips consent, gives Facebook servers user phone numbers

Norton published findings that Facebook's Android app has sent millions of people's phone numbers to its servers upon launch, without users even logging into the app.

Cisco fixes Web, email, content security appliance vulnerabilities

The networking giant has fixed a number of vulnerabilities that could allow hackers to remotely execute commands or disrupt critical processes.

South Korea hacks blamed on 'Dark Seoul Gang'

A four-year hacking spree inflicted on South Korea is apparently down to a single hacking group called the "Dark Seoul Gang."

HP enterprise storage systems suffer 'secret' admin account flaw

The computer and server maker is working hard on a fix to a security flaw in one of its enterprise systems, that could allow unauthorized access to corporate data.

Firm: Facebook 'bug' worse than reported; non-users also affected

According to the firm who found the bug, Facebook's email to six million users affected by its shadow profiles leak left out some numbers - and non-user contacts were also leaked.

The top ten most common database security vulnerabilities

What are the most common, and serious, database vulnerabilities that businesses should be aware of?

Google adds malware site flags to Transparency Report

Have you see those "warning" pages Google throws up when you're about to hit a malware-infested site? The search giant is now adding those flagged figures to its ongoing disclosure report.

Skype ditched peer-to-peer supernodes for scalability, not surveillance

Before Microsoft acquired Skype in 2011, the voice calling service was already ditching its "near impossible to wiretap" peer-to-peer model in favor of the cloud.

NSA instigates security measures to hamper future whistleblowers

A new "two-man rule" will be put into place to stop administrators from having access to entire governmental systems.

Copyright © 2015 Regator, LLC