Post Thumbnail

Typically, coders and researchers who discover security vulnerabilities in software will tell the companies involved before posting their findings -- it's a courtesy to make sure that those holes are patched before attackers can use them. Don't tell that to developer Luca Todesco, though. He recen...

August 17th 2015 at 5:05pm 0 Comments
Post Thumbnail

Android has more than one video-related security hole on its hands at the moment. Trend Micro has found a flaw that uses a malformed Matroska (MKV) video in apps or websites to crash Android's "mediaserver" service, effectively turning the target device into a paperweight. It'll not only render yo...

July 29th 2015 at 7:41pm 0 Comments
Post Thumbnail

If you're an Android user, you'd better hope that a stranger doesn't send you a video message in the near future -- it might compromise your phone. Security researchers at Zimperium have discovered an exploit that lets attackers take control if they send a malware-laden MMS video. The kicker is...

July 27th 2015 at 10:03am 0 Comments
Post Thumbnail

Feel safe with your fully-patched computer? If you use Flash and land on the wrong website, you may get a virus or even a cryptolocker that renders your machine unusable. That's because a sophisticated "zero-day" exploit stolen from Hacking Team has now been released into the wild. As a reminder,...

July 8th 2015 at 6:00am 0 Comments
Post Thumbnail

Successful hack attacks often happen not because of tricky coding, but plain old "social engineering" -- ie, conning people. A Github researcher called "jansoucek" has discovered an iOS exploit that works on that principal to steal people's iCloud passwords. The latest version of iOS, 8.3, apparen...

June 11th 2015 at 4:27am 0 Comments
Post Thumbnail

There's a new vulnerability that could let evildoers control your Mac, even after you format the system drive. Discovered by OS X security expert Pedro Vilaca, the exploit targets older machines after they wake up from sleep mode. The problem is that security normally protecting the firmware isn't...

June 2nd 2015 at 3:48pm 0 Comments
Post Thumbnail

When the US Bureau of Industry and Security published how it plans to implement the sections on hacking technologies in a global weapons trade pact called the Wassenaar Arrangement (WA) last week, it ignited an online firestorm of meltdowns, freakouts, and vicious infighting within the most respec...

May 29th 2015 at 1:00pm 0 Comments
Post Thumbnail

If you've been wondering how Russian cyberattackers could compromise the White House and other high-profile political targets, the security researchers at FireEye have an answer. They've determined that APT28, a politically-motivated Russian hacking group, used unpatched exploits in Flash Player a...

April 18th 2015 at 11:11pm 0 Comments
Post Thumbnail

Google's Project Zero is supposed to goad companies into patching software security flaws before they pose a threat, but that's not exactly how the effort has panned out. As Apple and Microsoft will tell you, the strict 90-day disclosure deadline sometimes leaves developers scrambling to finish pa...

February 15th 2015 at 4:59pm 0 Comments
Post Thumbnail

Last last week, BioWare community manager Eric Musco wrote a detailed post regarding a recent exploit that's plagued the PvE endgame for Star Wars: The Old Republic, explaining the planned punishments and the team's reasoning behind them. "We didn't take these actions lightly," Musco posts, "and r...

January 31st 2015 at 6:00pm 0 Comments
Post Thumbnail

Microsoft isn't the only big tech firm grappling with surprise security flaw disclosures these days. Google's Project Zero security unit revealed at least two unpatched vulnerabilities in OS X (Yosemite appears to have mitigated a third) that theoretically help attackers take control of your Mac....

January 23rd 2015 at 3:33pm 0 Comments