The HTTPS cryptographic scheme, which protects millions of websites, is susceptible to a new attack that allows hackers to pluck e-mail addresses and certain types of security credentials out of encrypted pages, often in as little as 30 seconds.
Author: ISBuzz Team
While the National Security Agency has gotten most of the recent flak for spying on people via the Internet and cell phone records, the Federal Bureau of Investigation appears to be doing some cyber spying of its own.
The number of requests for Twitter user data from governments around the world continued to grow in the first half of 2013, the microblogging service said in its semiannual transparency report, released Wednesday.
Black Hat 2013 Security researchers say they have developed an interesting trick to take over Gmail and Outlook.com email accounts – by shooting down victims’ logout requests even over a supposedly encrypted connection.
Finally, after two years from the first release of the feature and hoping that the users will switch to https, Facebook enforces now https to all users by default.
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network.
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities.
The recently disclosed Android master key vulnerability by CTO of BlueBox, Jeff Forristal, allows an attacker to inject malicious code into an Android application without the need to alter or invalidate the application’s digital signature.
Distributed denial of service (DDoS) attacks continue to be a global threat with a clear increase in attack size, speed and complexity, according to the latest report from Arbor Networks.
The Cloud Security Alliance (CSA) is addressing cloud customer concerns about data security by tying up with the British Standards Institute (BSI).