You Are Here: Home » Industry News

Parents May Be Responsible for Children’s Facebook Posts

Parents may be accused of cyberbullying and held legally liable for their children’s Facebook activity if found offensive, according to a Reuters news story. This decision, ruled by Presiding Judge John J. Ellington from the Court of Appeals of Georgia, was taken after two seven-grade students posted inappropriate comments about a colleague on a fake Facebook profile. The two created the fake page impersona...

‘Anonymous’ Users of Whisper Sharing App Tracked by IP Geolocation and GPS

Users of Whisper sharing app that are supposed to be anonymous have had their posts located by IP Geolocation or GPS, according to The Guardian. Whisper branded itself as the "safest place on the internet", while users disclose sensitive details of their professional or work experiences "anonymously." From The Guardian's report it appears that Whisper,  beside gathering data from its users, has also shared...

FBI Points Fingers at China, Warns U.S. Enterprises of Cyber-Attacks

The Federal Bureau of Investigation blames China for hackings targeting U.S. companies, and warns enterprises to stay on guard to prevent future breaches, according to Reuters. The agency said it recently got information regarding a group of Chinese cyber-actors affiliated to the Beijing government, who are regularly stealing “high-value information from U.S. commercial and government networks through cyber...

Four Million Plug and Play Devices Become Potential Tools in DDoS Attacks

Millions of home and office devices, including routers, media servers, webcams, smart TVs and printers are vulnerable and can be used to launch large-scale denial-of-service attacks, according to an advisory by cloud provider Akamai. “The rise of reflection attacks involving UPnP devices is an example of how fluid and dynamic the DDoS crime ecosystem can be”, Akamai says. Since July 2014, Akamai’s Prolexic...

Cross-Site Scripting (XSS) Vulnerability in New York Times’ Articles Before 2013

New York Times articles’ pages from the nytimes[dot]com domain, dated before 2013 suffer from an XSS cross-site scripting vulnerability, according to the report posted by security researcher Wang Jing on the Tetraph Blog. Cross-site scripting (XSS) vulnerabilities usually reside in web applications and can be used by attackers to modify the normal flow of the web page. "For XSS attacks, one important thing...

Facebook Bug Bounties for Ads Code Just Doubled

Facebook doubled the bounties for security vulnerabilities discovered in the code behind its advertising system, according to PC World. Researchers who find bugs in the ads code will be paid at least $1,000, and not $500 as until now. Typical vulnerabilities include wrong permission checks, insufficient rate-limiting, edge-case CSRF issues, and Flash problems in the ads code. The social network announced it...

SSL 3.0 “Poodle” Flaw Opens Encrypted Data to Eavesdropping

A vulnerability in the design of the SSL 3.0 protocol can be exploited to intercept secure cookies transmitted between clients and servers in a reasonable amount of time, Google announced in blog post. Three Google researchers uncovered the “Poodle” (Padding Oracle On Downgraded Legacy Encryption) flaw which affects a large number of Internet-connected servers that can to fall back to the vulnerable SSL v3...

NSA Agents Physically Infiltrated Communication Companies from China, Germany and South Korea

The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their "physical subversion" programs. The Intercept reported that the National Security Agency used "under cover" agents to access important systems and data from the communication industry. "The documents describe...

Schoolgirl aged 15 left humiliated when teachers showed her bikini photo in assembly

Remember when you were a teenager? And you had thousands of friends on Facebook? No? That doesn’t describe my childhood, either, but it rings true to many of today’s teens. According to a survey, a child’s social media development begins at nine and over the next four year period, their online activity evolves from just viewing online content to using social media platforms. Social networking safety issues...

CyanogenMod-Powered Users Susceptible to Man-in-the-middle Attacks

Android users running the popular CyanogenMod third-party ROM could fall victim to man-in-the-middle (MitM) attacks, apparently possible because of the re-use of sample Java code. According to a news report from The Register, CyanogenMod developers re-used a snippet of code provided by Oracle as proof of concept code to process SSL certificates and validate hostnames. The 10 year old piece of code, publicly...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top