All Blogs / Technology / Security / Popular


Oracle Deletes CSO’s Screed Against Hackers Who Report Bugs

Oracle undoes the problems created by their CSO’s rant by deleting her blog post. Done. ? PS: http://t.co/EyvsPngufQ pic.twitter.com/Tckm33b91H — Mikko Hypponen (@mikko) August 11, 2015 If you take apart Oracle’s software and find a hackable vulnerability, don’t tell the company. Show More Summary

Adobe patches critical Flash security flaws

The plugin maker has patched dozens of flaws, five of which are considered priority fixes

Oracle to 'sinner' customers: Reverse engineering is a sin and we know best

Opinion: Stop sending vulnerability reports already. Oracle's chief security officer wants to go back to writing murder mysteries. [UPDATED]

APT Darkhotel deploys Hacking Team zero-day vulnerability

The hackers have ramped up their efforts with new vulnerabilities, new range and new targets.

Symantec to spin off Veritas storage business: report

The security firm has reportedly agreed to sell off Veritas in a bid to improve business flexibility.

Internet of Things device security degrades over time

Connected home devices may be secure enough off the shelf but this doesn't mean this will always be the case, tech firms have warned.

Hackers Cut a Corvette’s Brakes Via a Common Car Gadget

The free dongles that insurance companies ask customers to plug into their dashes could expose your car to hackers. The post Hackers Cut a Corvette’s Brakes Via a Common Car Gadget appeared first on WIRED.

Imploding Barrels and Other Highlights From Hackfest DefCon

As this year’s DefCon draws to a close, here’s a compendium of some of the con’s highlights. The post Imploding Barrels and Other Highlights From Hackfest DefCon appeared first on WIRED.

Internet-Connected Gas Pumps Are a Lure for Hackers

To see how real a risk Internet-connected gas pumps were, Kyle Wilhoit and Stephen Hilt from TrendMicro set up a GasPot to lure hackers and watch what they would do. The post Internet-Connected Gas Pumps Are a Lure for Hackers appeared first on WIRED.

Privacy visor which blocks facial recognition software set for public release

If you're concerned about surveillance and tracking, you will soon be able to own a "privacy visor" for yourself.

Carphone Warehouse admits up to 2.4 million customers affected by data breach

Stolen data may include credit card data and sensitive information used in identity theft.

Security News This Week: The Pentagon Got Hacked While You Were at Def Con

The security world doesn’t stop for Def Con, so here’s the big news that happened in the rest of the world. The post Security News This Week: The Pentagon Got Hacked While You Were at Def Con appeared first on WIRED.

How Fiction Can Reveal the Horrors of Future Wars

In exploring such futures, fiction can also flesh out a looming danger not just of a war, but new technologies used within it. The post How Fiction Can Reveal the Horrors of Future Wars appeared first on WIRED.

Dealing with drones (quad-copters) part 2

I wrote an article about drones a few days ago and one reader took me to task. Mobile drones quad-copters Mike Williams faa RC

Critical IoT security flaw leaves connected home devices vulnerable

IoT devices offered by firms ranging from Samsung to Phillips may be vulnerable to exploit and hijacking.

Windows patches can be intercepted and injected with malware

Researchers say Windows machines that fetch updates from an enterprise update server not configured to use encryption are vulnerable to an injection attack.

Why Retaliation Against China for the OPM Hack is a Bad Idea

I've written an OpEd on why the White House needs to look at deterrence in cyberspace differently based upon their announcement via David Sanger at the New York Times that they're looking at taking action against China for the OPM hack.You can read it at the Christian Science Monitor or at The Diplomat. Comments are always welcome.

Big Android Makers Will Now Push Monthly Security Updates

The Stagefright bug has quickly frightened cell phone manufacturers into action. The post Big Android Makers Will Now Push Monthly Security Updates appeared first on WIRED.

Attackers can access Dropbox, Google Drive, OneDrive files without a user's password

The so-called "man-in-the-cloud" attack is said to be a common flaw in most cloud-based file synchronization services.

Three top tips to keep connected cars safe from hackers

As auto manufacturing dips a toe into the computing realm, how can consumers be protected?

Copyright © 2015 Regator, LLC