Infosecurity News

  1. Visual Hacking is Successful 91% of the Time

    A white hat walking through the office scouting for information on desks and monitor screens was highly successful.

  2. Google’s YOLO API Set to Speed Secure App Log-Ins

    Latest project will make things easier for password manager users

  3. Connected Cars Exposed: Half Have Potentially Serious Flaws

    IOAtive study finds bugs in virtually every component

  4. Jeep Hackers Demonstrate New, Terrifying Compromises

    Hacks include acceleration, slamming the breaks on remotely and turning the vehicle’s steering wheel at any speed.

  5. Hackable Thermostats Heat Up IoT Security

    The most obvious danger is from home invaders who can gain easy access to the wake up and work schedule for an entire household.

  6. Michael Phelps Targeted by Hackers After Winning 19th Gold Medal

    New World Hackers has claimed responsibility for taking down the U.S. swimmer’s website.

  7. Symantec Spots State-Sponsored ‘Strider’ Attacks

    Group has only hit seven organizations in five years

  8. #DefCon: Thermostat Control Hacked to Host Ransomware

    Thermostat security has been proved to be particularly vulnerable, with ransomware able to infect and run on it.

  9. #DefCon US Government Only Holds Dozens of Zero-Days

    The US Government only holds “dozens” of vulnerabilities at any one time.

  10. Researchers Hack Tesla S's Autopilot System

    The white hats showed the potential to make surrounding objects “disappear” from the autopilot’s view.

  11. Mayhem the Hacker-Bot Wins $2M DARPA Challenge

    Mayhem was created by a Pittsburgh-based team known as ForAllSecure—one of seven teams that competed for nearly $4 million.

  12. #BHUSA: Apple To Pay Bug Bounties

    In the wake of its legal battle with the FBI over security vulnerabilities and access, Apple is launching its first-ever bug bounty program with potential payouts as large as USD$200,000.

  13. #BHUSA Researchers Present Deep Sea Phishing Exercise

    Using data science, cybersecurity researchers have released a new approach that makes automated phishing exploits almost as fruitful as typically more time-consuming spear-phishing methods.

  14. HTTP/2 Bugs Could Deny Service for Millions

    Imperva urges firms to implement safeguards

  15. Italian Android RAT Targets China and Japan

    New info-stealing malware could be part of wider APT campaign

  16. #BUHSA Attacks on Activists are Prevalent, but Unsophisticated

    State-sponsored attacks and tool used have been observed to not be sophisticated, but activists remain in danger.

  17. #BHUSA: 15 Years of Under-investment in Cybersecurity Makes Us Think the Sky is Falling

    We can’t stop spending on cybersecurity in favour of cyber-insurance, say Deloitte researchers at Black Hat, Las Vegas

  18. #BHUSA Build Backdoors and Government Will Use Them

    Law enforcement has become more aggressive because of encryption, as law enforcement become more eager to access details in investigations.

  19. #BHUSA: How to Use Linguistic Forensics to Detect Phone Scammers

    There is a non-technological solution to defending against phone scammers, said Dr Judith Tabron at Black Hat USA 2016, and it’s at the human level…

  20. Just in Time for the Olympics, Panda Zeus Chomps Into Brazil

    One hungry bear, this Zeus variant is targeting banks, Bitcoin users and local services, just as the country prepares to host the Olympic Games.

What’s Hot on Infosecurity Magazine?