Space invasion: Solar storms pose critical threat to internet, US infrastructure

Sun plasma
A new report on vulnerabilities in the US power grid sheds stark light on our ability to deal with certain kinds of threats. A coronal mass ejection of an equivalent magnitude to the one that hit the Earth in 1859 would cripple our infrastructure today, with some areas losing power for up to two years.

The original article can be found here: http://www.extremetech.com/extreme/161301-space-invasion-solar-storms-pose-critical-threat-to-us-infrastructure

Powered by WPeMatico

Report: Companies in the Dark About Their Open Source Risk Exposure


Commercial software is full of security vulnerabilities from unpatched open source components developers use, according to a report Black Duck Software issued last week. Software companies misjudge how much open source code their commercial products contain, according to the report, which is based on an analysis of 200 applications researchers viewed over the previous six months. Ninety-five percent of applications include open source code components, and 67 percent of open source components had unpatched vulnerabilities, researchers found.

The original article can be found here: http://www.ecommercetimes.com/story/83480.html?rss=1

Powered by WPeMatico

Lenovo protected its file sharing app with '12345678' password

A security researcher has discovered a number of vulnerabilities in Lenovo’s SHAREit app, the worst being the use of “12345678” as a hard-coded, default password.

The original article can be found here: http://www.foxnews.com/tech/2016/01/27/lenovo-protected-its-file-sharing-app-with-12345678-password.html

Powered by WPeMatico

Google researcher blasts TrendMicro for massive security hole

5-trend-micro-cap
A new security report from Google has found critical vulnerabilities in TrendMicro’s antivirus software. It’s the second time in a matter of weeks that we’ve seen major vendors under fire for inexcusable product flaws.

The original article can be found here: http://www.extremetech.com/computing/220985-google-researcher-blasts-trendmicro-for-massive-security-hole

Powered by WPeMatico

OS X El Capitan still exposed to vulnerabilities in Gatekeeper & Keychain, researchers say

Article Image OS X El Capitan, launched earlier on Wednesday, still contains serious vulnerabilities in its Gatekeeper and Keychain features, according to security researchers.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/4a4c7624/sc/28/l/0Lappleinsider0N0Carticles0C150C0A90C30A0Cos0Ex0Eel0Ecapitan0Estill0Eexposed0Eto0Evulnerabilities0Ein0Egatekeeper0Ekeychain0Eresearchers0Esay/story01.htm

Powered by WPeMatico

Macs vulnerable to same remote firmware exploits as Windows PCs, researchers find

Macs can still be successfully attacked using some of the same firmware vulnerabilities affecting many Windows PCs, a new proof-of-concept worm is said to demonstrate.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/48abd84c/sc/15/l/0Lappleinsider0N0Carticles0C150C0A80C0A30Cmacs0Evulnerable0Eto0Esame0Eremote0Efirmware0Eexploits0Eas0Ewindows0Epcs0Eresearchers0Efind/story01.htm

Powered by WPeMatico

It's time to uninstall Adobe's Flash from your Mac – here's how

The recent tidal wave of critical vulnerabilities in Adobe’s Flash Player has prompted many security professionals to call for the much-maligned software’s demise, and we agree. AppleInsider shows you how to uninstall Flash from your Mac, and what to do if you can’t live without it.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/4813a024/sc/28/l/0Lappleinsider0N0Carticles0C150C0A70C130Cits0Etime0Eto0Euninstall0Eadobes0Eflash0Efrom0Eyour0Emac0E0E0Eheres0Ehow/story01.htm

Powered by WPeMatico

Flash Player update closes vulnerability identified by Hacking Team

Adobe on Wednesday updated Flash Player to fix a number of security vulnerabilities, including one in the hands of Hacking Team, a company that infamously sold snooping tools and services to government agencies around the world — potentially including harsh authoritarian regimes.

The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/47f4734c/sc/28/l/0Lappleinsider0N0Carticles0C150C0A70C0A80Cflash0Eplayer0Eupdate0Ecloses0Evulnerability0Eidentified0Eby0Ehacking0Eteam/story01.htm

Powered by WPeMatico

Serious iOS, OS X flaws lead to password theft in wide ranging security study

Three serious vulnerabilities in cross-app resource sharing protocols on Apple’s desktop and mobile platforms have been discovered and used successfully to steal data –?like passwords and secret authentication keys –?including one that lays Keychain open to attackers.



The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/4752a0d5/sc/28/l/0Lappleinsider0N0Carticles0C150C0A60C170Cserious0Eios0Eos0Ex0Eflaws0Elead0Eto0Epassword0Etheft0Ein0Ewide0Eranging0Esecurity0Estudy/story01.htm

Powered by WPeMatico

Latest Safari update brings fixes for WebKit security flaws

Apple on Tuesday issued new versions of its Safari Web browser for OS X with fixes for two WebKit vulnerabilities that could allow maliciously crafted code to run on a target Mac.



The original article can be found here: http://appleinsider.com.feedsportal.com/c/33975/f/616168/s/4480e7b1/sc/5/l/0Lappleinsider0N0Carticles0C150C0A30C170Clatest0Esafari0Eupdate0Ebrings0Efixes0Efor0Ewebkit0Esecurity0Eflaws/story01.htm

Powered by WPeMatico