Infosec News

InfoSec News 20181102

  • Publicado: Sex, 02/11/2018 - 09:01

Top News


  • Accused CIA Leaker Faces New Charges of Leaking Information From Prison

“Joshua Adam Schulte, a 30-year-old former CIA computer programmer who was indicted over four months ago for masterminding the largest leak of classified information in the agency's history, has now been issued three new charges.”

Link

TLP1 : Green

InfoSec News 20181031

  • Publicado: Qua, 31/10/2018 - 09:00

Top News


  • A few hours after Apple released iOS 12.1, a researcher presented a Passcode Bypass issue

“A few hours after Apple released iOS 12.1 the iPhone bug hunter Jose Rodriguez has found a new passcode bypass issue that could be exploited to see all contacts’ private information on a locked iPhone.”

Link

TLP1 : Green

InfoSec News 20181030

  • Publicado: Ter, 30/10/2018 - 00:00

Top News


  • Signal Secure Messaging App Now Encrypts Sender's Identity As Well

“Signal, the popular end-to-end encrypted messaging app, is planning to roll out a new feature that aims to hide the sender's identity from potential attackers trying to intercept the communication.”

Link

TLP1 : Green

InfoSec News 20181029

  • Publicado: Seg, 29/10/2018 - 00:00

Top News


  • IBM buys Red Hat for $34 Billion, it is largest software transaction in history

“IBM announced it is going to buy the open source company Red Hat for $34bn with the intent to enhance its cloud offerings”

Link

TLP1 : Green

InfoSec News 20181026

  • Publicado: Sex, 26/10/2018 - 00:00

Top News


  • Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

“Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. Security expert Antonio Pirozzi, director at ZLab malware lab at Cybaze firm, presented at the EU Cyber Threat Conference in Dublin conducted a research along with Pierluigi Paganini (aka @securityaffairs), about how crooks could abuse blockchain […]”

InfoSec News 20181025

  • Publicado: Qui, 25/10/2018 - 11:17

Top News


  • 'Apple needs to come clean' over its dealings with China says ex-Facebook security chief as he slams tech giant for enabling Beijing's online crackdown

“A former security chief at Facebook has blasted Apple over its role in enabling Internet censorship in China. Alex Stamos said Apple needed to 'come clean' on how its products worked in China, saying tech firms had an 'ethical blind spot' in their dealings with Beijing.”

InfoSec News 20181024

  • Publicado: Qua, 24/10/2018 - 00:00

Top News


  • Russian Government-owned research institute linked to Triton attacks

“The Triton malware has been used in attacks aimed at a critical infrastructure organization in the Middle East, experts speculate the involvement of a state-sponsored actor for sabotage purpose due to the lack of financial motivation and the level of sophistication of the attacks.”

Link

TLP1 : Green

InfoSec News 20181023

  • Publicado: Ter, 23/10/2018 - 00:00

Top News


  • If Facebook buys a security company, how will it retain the staff who absolutely hate Facebook? 

“The Information is right about Facebook’s scorched reputation when it comes to data privacy and security. This year has seen a number of disturbing revelations, as well as a growing understanding amongst users of just how the site exploits people’s private information.”

Link

InfoSec News 20181022

  • Publicado: Seg, 22/10/2018 - 00:00

Top News


  • The Tiny Chip That Powers Up Pixel 3 Security

“The Titan M chip may be small and discreet, but it helps make the Pixel 3 and its beefier sibling, the Pixel 3 XL, among the most secure smartphones you can buy.”

Link

TLP1 : Green

InfoSec News 20181019

  • Publicado: Sex, 19/10/2018 - 00:00

Top News


  • RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin

“A US court has sentenced a programmer to 30 months in a federal prison in connection with software that claimed to be a legitimate tool for Windows sysadmins to remotely manage computers, but was actually used by criminals to backdoor PCs and secretly spy on victims.”

Link

Páginas