US authorities Tuesday unveiled criminal charges against three members of the so-called "Syrian Electronic Army," which gained notoriety for hacking into news media outlets and making bogus social media posts.
read more
Apple-FBI Encryption Showdown Postponed, for Now
The US government's decision to delay its effort to force Apple to help unlock an attacker's iPhone may only postpone the inevitable drawn-out battle over encryption and data protection.
read more
Yahoo Kills Passwords in Multiple Mobile Apps
Yahoo has expanded its password-free approach to user security to more applications for Android and iOS devices, namely Yahoo Finance, Fantasy, Messenger, and Sports.
read more
StartSSL Flaw Allowed Attackers to Obtain SSL Cert for Any Domain
Popular certificate authority StartSSL (StartCom) has resolved a security vulnerability in its domain validation process that could be abused by attackers to issue certificates for domains they do not own.
read more
Uber Offers up to $10,000 in Bug Bounty Program
Uber announced on Tuesday the launch of a bug bounty program whose goal is to encourage security researchers to responsibly disclose vulnerabilities found in the ride-sharing company’s websites and applications.
read more
Malvertising Campaign Abuses Baidu Ad API
Researchers at FireEye discovered a malvertising campaign in which attackers delivered malware by abusing a legitimate ad API provided by Chinese web services company Baidu.
read more
Attackers Alter Water Treatment Systems in Utility Hack: Report
Hackers breached a water utility and manipulated systems responsible for water treatment and flow control, Verizon said in a report released this month.
read more
Surviving Contact with the Enemy
Strategy without the ability to execute is destined to fail, and execution without forethought will face the same fate.
Most individuals find it difficult to think in terms of direction and action, so what happens when you have to juggle the two priorities? How do security executives strike the right balance, while aligning to business priorities, operational capabilities and their threats?
read more
Apple Patches Serious Encryption Flaws in iMessage
Updates released by Apple on Monday for its iOS and Mac OS X operating systems address serious encryption flaws affecting the company’s iMessage messaging protocol, which is reportedly used to send as many as 200,000 messages every second.
read more
US Govt Says May Not Need Apple Help in iPhone Battle
The US government said Monday it may have found a way to access the iPhone of one of the San Bernardino attackers without Apple's help, possibly avoiding a showdown with the tech giant.
On Sunday, "an outside party demonstrated to the FBI a possible method for unlocking Farook's iPhone," Justice Department attorneys said in a court filing.
read more


