-
April 12, 2014
Dropbox’s buffed-up business offering is better, but far from best
Dropbox’s buffed-up business offering is better, but far from best: Last year Dropbox faced stiff competition in the business file-sharing space from a slew of other vendors. The company pumped up its business-level offering, adding a smattering of controls and auditing functions, but it still fell short against its competition in a few ways. Now […]
-
April 12, 2014
Heartbleed may not leak private SSL keys after all
Heartbleed may not leak private SSL keys after all: After this week’s massive Heartbleed bug, one of the biggest concerns was that the bug might leak a website’s private SSL keys, the key to the green lock that secures data sent to users. It’s especially dangerous because, if an attacker did access the keys, they […]
-
April 12, 2014
How researchers hack Google using XXE vulnerability!
How researchers hack Google using XXE vulnerability!: What is most secure website? NOTHING. Even Google is vulnerable to all sort of attacks! Security researchers and Co-Founders of Detectify have discovered a critical security vulnerability in Google that allowed them to access Internal servers. The vulnerability exists in the Google Toolbar button gallery. The page allows […]
-
April 10, 2014
Windows 8.1 Update can actually STOP all future updates!
Windows 8.1 Update can actually STOP all future updates! Crazy.: Microsoft has temporarily suspended distribution of Windows 8.1 Update, after it was found that it can cause some updated PCs to actually stop looking for future updates. The irony is, of course, that Windows 8.1 Update is a mandatory update, which – as I described […]
-
April 9, 2014
The ‘Privacy Dinosaur’ urges Facebook users to check their privacy settings
The ‘Privacy Dinosaur’ urges Facebook users to check their privacy settings: Facebook has introduced a blue cartoon Zuckersaurus-Rex, or some other type of dinosaur, to warn users when they are about to post something publicly. Facebook has always had an interesting relationship with its users and their privacy. Now, users who haven’t adjusted their privacy […]
-
April 9, 2014
Tax Identity Theft: Why You’re Vulnerable
Tax Identity Theft: Why You’re Vulnerable: A few weeks ago, a friend of mine – let’s call her Mallory – got an unsettling call from her accountant. The accountant had been preparing Mallory’s taxes, hit “Send” to e-file the finished return, and it was rejected. Someone had already filed a tax return using Mallory’s Social […]
-
April 9, 2014
Adobe issues Flash security update
Adobe issues Flash security update: Adobe has released security updates for Flash Player on Windows, Mac and Linux. The update addresses four security vulnerability described by Adobe in this way: A use-after-free vulnerability that could result in arbitrary code execution (CVE-2014-0506) A buffer overflow vulnerability that could result in arbitrary code execution (CVE-2014-0507) A security […]
-
April 9, 2014
If security is hampering your business, you need to look at your security policy
If security is hampering your business, you need to look at your security policy: If you’ve got four or five thousand devices out there, with employees able to access work information on each device, you get a number of things happening. A: They lose them. B: They lose them in really embarrassing places, like public […]
-
April 9, 2014
Hackers Lurking in Vents and Soda Machines
Hackers Lurking in Vents and Soda Machines: They came in through the Chinese takeout menu. Unable to breach the computer network at a big oil company, hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the […]
-
April 8, 2014
‘Heartbleed’ Bug Exposes Passwords, Web Site Encryption Keys
‘Heartbleed’ Bug Exposes Passwords, Web Site Encryption Keys: “The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows […]