German researchers claim they have found weaknesses in two commonly-used satellite encryption protocols that could render them vulnerable to eavesdropping in real time. In the paper titled Don’t Trust Satellite Phones (currently available only as an abstract), Benedikt Driessen and Ralf Hund of Ruhr University describe how they reverse engineered…
Microsoft researchers discover malicious cookie scheme
Microsoft researchers checking how easy it is to identify users by analysing commonly collected web-log data incidentally discovered a cookie-forwarding scheme that can be used to aid session hijacking. If put into play, the scheme could clandestinely forward stolen session cookies to individual zombie machines in botnets that could use…
Researchers Hack Into Corporate Conference Rooms
The researchers were able to listen in on meetings and control a camera remotely to read information on documents. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security
SCADA industrial control systems exposed by security researchers
Researchers showcased unpatched security flaws in software used to control critical industrial systems by oil, gas, water and electrical distribution plants at the 2012 SCADA Security Scientific Symposium (S4) last week. The vulnerabilities ranged from information disclosure and privilege escalation bugs to remote denial-of-service (DoS) and arbitrary code execution flaws….
Blackberry PlayBook Bridge app vulnerability discovered by researchers
Research in Motion may have improved its overall experience on the PlayBook with its recent update, but security researchers recently revealed that the device leaves corporate email and user information open to potential hackers. Researchers Zach Lenier and Ben Nell of Intrepidus Group uncovered a vulnerability in the PlayBook’s Bridge…
Researcher’s Tool Maps Malware In Beautiful 3D Models
Quist’s VERA visualization software showing a key section of the Koobface worm. Security researchers face a tough problem: Computer viruses, unlike their biological counterparts, can’t be seen under a microscope. Even common reverse engineering tools merely render malware as thousands of lines of garbled text more legible to machine than…
Worm steals 45,000 Facebook passwords, researchers say
A computer worm has stolen 45,000 login credentials from Facebook, security experts have warned. … View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms
Researchers find many weak Stratfor passwords
A professor at Utah Valley University analyzed the leaked password hashes stolen by Anonymous from security firm Stratfor and determined even their security minded customers choose weak passwords. View full post on Naked Security – Sophos View full post on National Cyber Security
Researchers: Stuxnet, Duqu Part of a Malware Arsenal Dating to 2007
Kaspersky Lab researchers think the powerful computer worms are based on a common driver-based platform used by a ‘team of developers’ for years. View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms
Could your printer be a Trojan horse? Researchers say yes!
Columbia University researchers report new security flaws in networked printers that could open up an entirely new array of security threats. View full post on could security – Yahoo! News Search Results View full post on National Cyber Security