A new vulnerability dubbed Fake ID, which lets third party apps downloaded by the user to copy identity credentials of trusted applications, has been discovered by security researchers over at Bluebox security….
Category: Security
Spammers exploit MH-17 tragedy
Scammers create fake MH17 Facebook and Twitter tribute pages and posts with likes to spammy sites, in the name of the victims identity to cash-in.
Dropbox is ‘hostile to privacy’, Snowden claims
The whistleblower has dubbed Condoleezza Rice as the most anti-privacy official one can imagine.
ICO faced internal data breach; remains tight-lipped
The entity that holds responsibility for ensuring the privacy and security of information, has admitted to have suffered a ‘non-trivial data security incident.’
ICO: Data protection complaints increased by 10% last year
ICO: We’re effective, efficient and busier than ever. But to do our job properly, to represent people properly, we need stronger powers, more sustainable funding and a clearer guarantee of independence.
Google initiates Project-Zero to fend off zero-day attacks
Yet another Google project – Project Zero with the objective to ‘significantly reduce the number of people harmed by targeted attacks.’
Apple responds to safeguard iPhone from China’s national security threat allegations
Having been pulled into the blame game by China, the Cupertino replied that “Apple does not track users’ locations — Apple has never done so and has no plans to ever do so.”
Survey: 64% critical infrastructure firms foresee serious security attacks in the year ahead
Despite anticipating serious attacks, only 28 percent have security in their top five strategic priorities for the organisation.
Apple goes after outdated Flash versions; blocks them
Just like Java, Flash is proving to be one of those plugins that is becoming a pain for many.
Microsoft settles with Vitalwerks after crippling its No-IP service
The restraining order against No-IP saw as many as 4 million customers affected – most of them not even affected with the malware in question.
China denies CrowdStrike’s claims of links to Deep Panda hacking
Geng Shuang: Chinese laws prohibit cyber crimes of all forms, and Chinese government has done whatever it can to combat such activities.
Invisible.im in works to offer anonymity to whistleblowers
Invisible.im: We hope Invisible.im (or something like it) will become the de facto standard for instant message conversations on the Internet. However, not in 2014!
Microsoft’s ‘draconian’ No-IP domain seizure impacts 4M users
Due to a technical error, millions of innocent users also experienced a “temporary loss of service.”
Microsoft bolsters Outlook and OneDrive’s encryption
Flipping the switch for stronger encryption, Microsoft adds another layer of email protection!
Microsoft takes on malware creators from Kuwait, Algeria; goes after No-IP
Microsoft has sought legal action to take on criminals believed to be hiding in Kuwait, Algeria.