Fahmida Y. Rashid

Michigan State Police Deny Warrantless Data Scans of Motorists’ Phones

The Michigan State Police use portable machines called data extraction devices that can download personal information from mobile devices. The state’s branch of the American Civil Liberties Union wants to know how the police department is using the five such devices it owns. These portable devices can be used to “secretly extract personal information from […]

Cyber-Attacks Targeting Power, Gas Utilities on the Rise: Survey

Critical infrastructure in the United States, including power and gas utilities, remains vulnerable to cyber-attack, and organizations are unprepared to handle major incidents, a research report found. A survey of 200 IT executives in charge of security at power, oil, gas and water utilities in 14 countries showed that 80 percent of the respondents said […]

Adobe Patches Latest Critical Flash Hole in Reader, Acrobat

Adobe patched a critical Flash bug in Adobe Reader a few days earlier than expected. Rogue PDF files exploiting the bug have recently been detected in the wild, Adobe said. This is Adobe’s second out-of-band update to address a Flash Player zero-day vulnerability in the past month. After a round of frenzied patching in March, […]

Cyber-Thief Hackett Pleads Guilty to Credit Card Theft

And yet another cyber-thief faces prison time. Rogelio Hacket, Jr, is the latest cyber-criminal to admitting to stealing credit card numbers and selling them to others. The Georgia resident pled guilty to fraud and identity theft in the United States District Court for the Eastern District of Virginia.April 21, according to the Department of Justice. […]

More Than Half of Web Apps Fail Security Audit Prior to Deployment

More than half of Web applications have some kind of serious security flaw after development, according to a research report, suggesting that software developers need to improve their security coding skills. About 58 percent of Web applications generally fail a security audit the first time around, according to Veracode’s State of Software Security report, released […]

Lost, Stolen Laptops Cost Companies Billions in 2010

The Ponemon Institute surveyed 275 European organizations in its latest lost laptop report to determine the economic consequences of having a laptop lost or stolen. Participating organizations lost more than 72,000 laptops during a 12-month period for a total economic impact of $1.79 billion, according to the “The Billion Euro Lost Laptop Problem” report, released […]

Lawmakers Demand Apple Clarify iPhone Tracking Capability

Amid a brewing controversy over a tracking feature in Apple’s iOS 4, several members of Congress have called on Apple to explain what the information is for. Rep. Edward Markey (D-Mass.) wrote to Apple CEO Steve Jobs on April 21 requesting information and suggesting that the practice may violate the Federal Communications Act. Markey asked […]

Facebook’s Latest Privacy Improvements Fail to Impress Sophos

A day after security firm Sophos penned an open letter asking Facebook to improve its privacy and security features, Facebook introduced a suite of security tools aimed at helping users stay safe online. The social networking giant improved its social reporting tools for flagging wall posts and photos as spam, improved its secure browsing options […]

Microsoft to Disclose Third Party Vulnerabilities

Microsoft will begin disclosing vulnerabilities it finds in third-party Windows software in addition to its own products. It started off with two bugs in Google’s Chrome Web browser. In a nine-page document titled “Coordinated Vulnerability Disclosure at Microsoft,” the company outlined how Microsoft developers will reveal security flaws in its own and other companies’ software, […]

Oracle Fixed 73 Bugs in April’s Critical Patch Update

Oracle on April 19 released 25 security patches that addressed 73 vulnerabilities, of which 36 have been classified as “critical,” as part of its quarterly Critical Patch Update. The critical issues may be exploited remotely without requiring a username or password. April’s CPU contained updates to Oracle Database Server11g and 10g, Oracle Fusion middleware, Oracle […]