Post Thumbnail

Who knew that owning a ZTE Score M would mean living life on the edge? ZTE has confirmed that the MetroPCS phone has a backdoor vulnerability which could let a less-than-scrupulous hacker get root-level control over the Android 2.3 phone -- and because it's a unique app baked into the firmware, th...

May 18th 2012 at 12:29pm 0 Comments
Post Thumbnail

Google, the service so great it became a verb, can now add security risk to its roster of unintended results. The search site played inadvertent host to remotely accessed Supervisory Control and Data Acquisition (SCADA) systems in a Black Hat conference demo led by FusionX's Tom Parker. The sec...

August 4th 2011 at 5:26am 0 Comments
Post Thumbnail

Verizon Android users have had 3G Skype calling since this time last year, but the latest app release -- v1.0.0.983 for those of you keeping tabs -- brings 3G calling to the masses, without the need for a VZW-sanctioned app. The update also patches a rather significant security hole discovered last...

April 20th 2011 at 9:10am 0 Comments
Post Thumbnail

If you didn't already have enough potential app privacy leaks to worry about, here's one more -- Android Police discovered that Skype's Android client leaves your personal data wide open to assault. The publication reports that the app has SQLite3 databases where all your info and chat logs are sto...

April 14th 2011 at 10:02pm 0 Comments
Post Thumbnail

Cisco and company, you've got approximately seven days before a security researcher rains down exploits on your web-based home router parade. Seismic's Craig Heffner claims he's got a tool that can hack "millions" of gateways using a new spin on the age-old DNS rebinding vulnerability, and plans to...

July 21st 2010 at 6:33am 0 Comments
Post Thumbnail

Say, Charles -- it's been awhile! But we're pleased as punch to see that you're back to your old ways, poking around within OS X's mainframe just looking for ways to remotely control the system, snag credit card data and download a few interoffice love letters that are carefully stashed 15 folders d...

March 19th 2010 at 9:29am 0 Comments
Post Thumbnail

Core Security, in an advisory that showed a contentious argument with Apple, disclosed three iCal bugs that attackers could exploit using malicious servers, web sites, and .ics email attachments. "The vulnerabilities may allow un-authenticated attackers to execute arbitrary code on vulnerable system...

May 22nd 2008 at 5:00pm 0 Comments
Post Thumbnail

What might Apple's surging sales of Macs have to do with the security of your computer? Possibly, a lot. In a recent CIO interview (conducted by our very own Lisa Hoover), Ollie Whitehouse, an architect for Symantec's Advanced Threat Research Team said that as the Mac keeps growing in popularity, so...

December 19th 2007 at 11:00pm 0 Comments