Oracle undoes the problems created by their CSO’s rant by deleting her blog post. Done. ? PS: http://t.co/EyvsPngufQ pic.twitter.com/Tckm33b91H — Mikko Hypponen (@mikko) August 11, 2015 If you take apart Oracle’s software and find a hackable vulnerability, don’t tell the company. Show More Summary
The plugin maker has patched dozens of flaws, five of which are considered priority fixes
Opinion: Stop sending vulnerability reports already. Oracle's chief security officer wants to go back to writing murder mysteries. [UPDATED]
The hackers have ramped up their efforts with new vulnerabilities, new range and new targets.
The security firm has reportedly agreed to sell off Veritas in a bid to improve business flexibility.
Connected home devices may be secure enough off the shelf but this doesn't mean this will always be the case, tech firms have warned.
The free dongles that insurance companies ask customers to plug into their dashes could expose your car to hackers. The post Hackers Cut a Corvette’s Brakes Via a Common Car Gadget appeared first on WIRED.
As this year’s DefCon draws to a close, here’s a compendium of some of the con’s highlights. The post Imploding Barrels and Other Highlights From Hackfest DefCon appeared first on WIRED.
To see how real a risk Internet-connected gas pumps were, Kyle Wilhoit and Stephen Hilt from TrendMicro set up a GasPot to lure hackers and watch what they would do. The post Internet-Connected Gas Pumps Are a Lure for Hackers appeared first on WIRED.
If you're concerned about surveillance and tracking, you will soon be able to own a "privacy visor" for yourself.
Stolen data may include credit card data and sensitive information used in identity theft.
The security world doesn’t stop for Def Con, so here’s the big news that happened in the rest of the world. The post Security News This Week: The Pentagon Got Hacked While You Were at Def Con appeared first on WIRED.
In exploring such futures, fiction can also flesh out a looming danger not just of a war, but new technologies used within it. The post How Fiction Can Reveal the Horrors of Future Wars appeared first on WIRED.
I wrote an article about drones a few days ago and one reader took me to task. Mobile drones quad-copters Mike Williams faa RC
IoT devices offered by firms ranging from Samsung to Phillips may be vulnerable to exploit and hijacking.
Researchers say Windows machines that fetch updates from an enterprise update server not configured to use encryption are vulnerable to an injection attack.
I've written an OpEd on why the White House needs to look at deterrence in cyberspace differently based upon their announcement via David Sanger at the New York Times that they're looking at taking action against China for the OPM hack.You can read it at the Christian Science Monitor or at The Diplomat. Comments are always welcome.
The Stagefright bug has quickly frightened cell phone manufacturers into action. The post Big Android Makers Will Now Push Monthly Security Updates appeared first on WIRED.
The so-called "man-in-the-cloud" attack is said to be a common flaw in most cloud-based file synchronization services.
As auto manufacturing dips a toe into the computing realm, how can consumers be protected?