The android version of Adobe PDF Reader – contains a security virus that could allow an attacker to give and take documents stored in reader and other files stored on the android’s memory card. The security researcher says: the problem is because of few insecure Javascript interfaces. These Javascript interfaces…
Arab hactivist use remote access Trojan to hack 24,000 machines worldwide.
Symantec threat lab researchers say Arab Hackers based in Middle East are targeting the computers world wide using remote access Trojan njRAT. There are 487 groups involved in certain hacking campaign. Symantec says, “Symantec has identified 487 groups of attackers mounting attacks using njRAT. These attacks appear to have…
EDGE Innovation Network opens online portal for quick access to off-the-shelf solutions for DHS
Top Priority Sector: disaster_preparedness_emergency_response The DHS’s Science and Technology Directorate will use the Knowledge Management System (KMS) from Scottsdale, AZ-based View full post on The Cyber Wars
NFC-enabled Samsung smartphones can now easily be used as ID badges for access control and other applications
Top Priority Sector: access_control_identification Dublin-based Allegion, a global provider of security products and solutions, has announced that it has become a member of the Samsung Solutions Exchange, which helps Samsung customers by creating mobile solutions on a large portfolio of enterprise-grade Samsung mobile devices. Read More…. View full post on…
Russian Intel and Spy Company SearchInform Hacked, Client Apps & Access Leaked By @Rucyborg
The leak was announced a couple of hours ago via twitter and posted to cyberguerrilla.org with the following message which states that the hackers have had access to searchinform.ru since as far back as 2012 and that they have infected download links. View full post on Cyber War News Read…
The Do’s and Don’ts of privileged user access control
Top Priority Sector: access_control_identification By Ken Ammon Homepage position: 1 View full post on The Cyber Wars
HID Global will showcase its “Secure Access to Everything” portfolio at RSA 2014
Top Priority Sector: access_control_identification HID Global, which specializes in secure identity solutions, has announced that it will showcase its end-to-end solution portfolio designed to protect organizations against unauthorized access to everything from the cloud, to data, to the door at this year’s View full post on The Cyber Wars
Case Study: Ridley College’s exacqVision open architecture surveillance integrates with existing analog cameras and Keyscan access system
Top Priority Sector: video_surveillance_cctv Image Caption: Julia Bertollo Read More…. View full post on The Cyber Wars
Northrop Grumman signs agreement with CA Technologies for cloud-based identity and access management services
Top Priority Sector: access_control_identification West Falls Church, VA-based Northrop Grumman has signed an agreement with CA Technologies, of Islandia, NY, to provide its customers with secure, cost-effective cloud-based identity and access management services in the fields of health care, civil government, and state and local markets. Read More…. View full…
Open Access explained:How scientific innovation is being…
Open Access explained:How scientific innovation is being restricted by greedy publishers.For more, read Aaron Swartz’s Guerrilla Open Access Manifesto. View full post on Your Anon News Read More…. View full post on The Cyber Wars