Intel Warns of Serious Processor Flaws

Intel has released firmware updates for many of its processors to fix eight high-risk flaws that can put systems at risk of complete compromise. The flaws are located in low-level technologies found in the Intel Management Engine (ME), the Intel Trusted Execution Engine (TXE) and the Intel Server Platform Services (SPS). By exploiting the vulnerabilities,..
Read more

Insecure Storage Buckets Expose 1.8 Billion Online Posts Scraped for U.S. Military

A Pentagon contractor left three storage buckets publicly accessible on Amazon’s S3 service, exposing more than 1.8 billion online posts collected since 2009. The messages, posted by people from around the world, were likely collected as part of an intelligence-gathering operation for the U.S. military. The breach was discovered by researchers from UpGuard, a company..
Read more

Oracle Patches Critical Vulnerabilities in PeopleSoft Applications

Oracle has released out-of-band security patches for a component used by multiple ERP applications from its PeopleSoft suite. The updates fix five vulnerabilities, including two critical ones that can be exploited to access data from or completely compromise those systems. The vulnerabilities are located in the Jolt protocol implementation within Oracle Tuxedo, an application server..
Read more

More Than 120 Malware Detections Triggered on NSA Employee’s Computer

Kaspersky Lab has concluded an internal investigation into an incident that led to the company being accused of using its antivirus program to copy secret files from the personal computer of an NSA employee. The company believes it has identified the incident in its logs, but telemetry data revealed more than 120 malware detections on..
Read more

How Extremists Groups Radicalize Recruits Online

Anyone with access to the internet can have their voice heard. And this is exactly the philosophy behind the extremist online radicalization and recruitment efforts of various terrorist organizations, including Hezbollah and ISIS/ISIL (Islamic State of Iraq and Syria/Islamic State of Iraq and the Levant). They invest time and effort to put forward image-heavy content..
Read more

Corporate Executives, Customers at Odds on Cybersecurity

Because companies accept and store sensitive, personally identifiable consumer customer data, they are responsible for safeguarding it against theft by cybercriminals. This should be common sense. Yet, according to a Ponemon Institute study commissioned by Centrify, only about half of the marketing and IT/security professionals polled agree that their companies “have an obligation to take..
Read more

Adobe Releases Critical Security Patches for 9 Products

Adobe Systems has released security patches for nine of its products to fix 86 vulnerabilities, the majority of which are rated as critical and important. In addition to Flash Player, Reader and Acrobat, which are the usual recipients of Adobe’s security patches, the company has updated Photoshop CC, Adobe Connect, Adobe DNG Converter, InDesign, Digital..
Read more

The Top 12 Hybrid Cloud Security Threats

Using a multiple-cloud architecture calls for a hybrid cloud security mindset, which tends to focus less on network security in favor of securing data wherever it may be. RightScale’s “2017 State of the Cloud” survey describes hybrid cloud as the preferred enterprise strategy, with 67 percent of the respondents using it. The interesting trend is that..
Read more
Page 1 of 812345...Last »