A firm specializing in advising on information security has published a report into a vulnerability found within a component known as NetUSB, a proprietary technology found within millions of home routers around the world. NetUSB is developed by a Taiwanese company called KCodes and is essentially offered as a means of allowing PCs and Macs to connect to USB devices over a network. The bug within the technology, if exploited, could essentially allow malicious individuals to compromise any device running the driver.
Looks like the Safari browser in iOS and OS X carries an inherent vulnerability that could allow attackers to exploit it for phishing purposes or distribution of malware. The exploit, as discovered by the researchers, is based on spoofing the Web URL to convince users that they're in fact visiting trusted and legit websites. More details on this news can be found right here.
In this day and age online security and encryption is often at the forefront in the minds of those of us that all but live our lives on the Internet. We send so much information about us over the wires that we often forget that the mediums we use may not be as secure as we would hope. It’s a modern problem that isn’t going to go away.
The decision to integrate biometric detection into consumer electronics may be popular with users and shows the willingness of companies to embrace emerging technologies, but the fundamental reason for such integration boils down to one thing: an attempt to improve security. The data associated with biometric capture extends beyond a simple password or code created by the user. It actually forms part of who that person is as an individual and is quite possibly as personal as it can get, so when things go wrong, as one research company will point out at this week's RSA, it raises a lot more eyebrows than a simple password breach. According to a new report, a number of Android devices are failing to protect the data of users that is captured through integrated biometric sensors.
A security analytics firm has identified a bug within a popular open-source networking library that potentially leaves up to 1,500 apps on the iOS App Store susceptible to malicious attacks. The report on the bug, which was identified last month, claims that apps using a particular version of the extremely popular AFNetworking library could be putting users at risk by exposing sensitive data - such as passwords, bank account information - and making it available to those with the expertise to exploit the vulnerability.
Crack for iPhone, iPad, iPod touch password on jailbroken iOS devices has been achieved using a piece of software. More details and video demo can be found after the jump.
The TaiG Jailbreak Team, currently one of the most prominent in the area of jailbreaking and iOS hacking, has announced that it will host a mobile security summit later this month.
It has been around a week since security researchers found a flaw that potentially left millions of computer, smartphone and tablet users at risk. The flaw, known as FREAK or Factoring Attack on RSA-EXPORT Keys if we're going to be all official, is no longer a problem for those carrying Apple products, after the company pushed out an update for various devices across its lineup.
Earlier this week, we learned of an antiquated security flaw that has been lurking for over a decade, and could leave Apple and Google device subject to attack. With the former said to be working on a fix to release in the near future, it has now been revealed that the FREAK security flaw also affects those running Windows machines, adding many millions more devices and users to the list of the vulnerable.
Hackers and security experts make a living from sourcing bugs and vulnerabilities with our everyday software, but while the aim of the game is to find and patch these bugs as swiftly as possible, some lie dormant for many years before being discovered. Case in point: a long-standing flaw affecting both Google and Apple software has just been highlighted, leaving users vulnerable to attack when visiting a number of apparently secure websites including Whitehouse.gov, NSA.gov and FBI.gov.