A Russian cyber-criminal group has stolen more than 1.2 billion usernames and passwords according to Hold Security. The group, dubbed “CyberVors,” accomplished this by comprising more than 400,000 servers and websites using a common class of software flaw, known as an SQL injection vulnerability. Initially, CyberVors bought a database of stolen credentials and used that […]
Under a proposed new Federal Communications Commission rule, telecoms will be blocked from forming joint ventures to bid for available segments of wireless spectrum that are scheduled to come up for auction in 2015. The proposal aims to help keep larger telecoms from taking over more of the wireless spectrum at the expense of smaller […]
Microsoft has released the final versions of Visual Studio 2013 Update 3 and Team Foundation Server 2013 Update 3 and the company is already is working on Visual Studio 2013 Update 4. Brian Harry, a Microsoft corporate vice president and technical fellow, explained that with the new release, Microsoft now provides CodeLens support for Git, […]
Lawyers for Microsoft have stated that the company intends to appeal a federal judge’s order that they turn over the contents of a customer’s email that’s stored on a server in Ireland. However, if Microsoft does comply with the order, the company will violate of both Irish and European laws. The court’s order is based […]
French telecom Iliad reportedly bid to buy T-Mobile, in an effort to counter a potential Sprint-T-Mobile merger that neither U.S. carrier will admit is being negotiated. The Wall Street Journal stated that people familiar with the matter said that Iliad views the deal as a “one-time opportunity” to enter the U.S. wireless market. While it’s […]
The Internet of Things offers consumers the opportunity to have all manner of devices connected to the Internet. However, a new study from Hewlett-Packard has pointed out that with the great power to connect also comes great risks. The company found a host of common vulnerabilities across 10 major IoT devices that it scanned for […]
Black Hat USA, Fake ID, Google, Bluebox Security, Android, Adobe, Hewlett-Packard, DefCon, Fortify on Demand, HP Fortify, Cisco, Application Centric Infrastructure, Google Drive, email, iOS, Apple, App Store, Google Play, At the 2013 Black Hat USA conference, Jeff Forristal revealed the Master Key vulnerability impacting millions of Android users. For this year’s conference, Forristal is […]
Samsung is delaying the launch of the Samsung Z, its first smartphone to run the Tizen operating system. Samsung issued a statement saying that it needed to “further enhance” the OS. Samsung was originally scheduled to release the phone in Russia this quarter before introducing it in additional markets. So far the company has offered […]
The Amazon Fire smartphone, which went on sale on July 25, comes with advanced features such as Dynamic Perspective, which is generated by four low-power special cameras, four infrared LEDs, a dedicated processor, real-time computer-vision algorithms and a high-performing graphics-rendering engine. While this feature is certainly interesting, it is also very difficult to fix. The […]
Apple, iOS, hackers, mobile devices, packet sniffer, National Security Agency, Tim Cook, iPhone, iPhone 5C, Oracle, Linux 7, Red Hat Enterprise Linux 7, XFS file system, Tails Linux, Amnesic Incognito Live System, Exodus Intelligence, Invisible Internet Project, Apple has denied a security researcher’s claim that its iOS devices collect a lot of personal data without […]