Monthly Archives: June 2016

Hillary Clinton’s language about encryption echoes Apple

Clinton’s position on “back doors” and encryption appears to mirror Apple’s public statements. Democratic presidential candidate Hillary Clinton’s language about encryption echoes Apple takes part in a discussion during a campaign stop, Saturday, April 23, 2016, at the Orangeside On … Continue reading

Posted in Cyber Security | Leave a comment

IRS Shuts Down e-File PIN Tool After More Attacks

The U.S. Internal Revenue Service (IRS) announced last week that it has decided to shut down the electronic filing PIN tool on its website after detecting more automated attacks. The e-File PIN tool on IRS.gov allowed taxpayers to generate PINs … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no impact on security. The news is intriguing, while Apple announced the new release of its mobile operating system, the iOS 10, … Continue reading

Posted in Vulnerabilidad | Tagged , | Leave a comment

Swagger staggered as hacker drops dapper code execution cracker

Silent maintainers put on notice An unpatched remote code execution hole has been publicly disclosed in the popular Swagger API framework, putting users at risk. The client and server hole (CVE-2016-5641) exists in code generators within the REST programming tool, … Continue reading

Posted in Vulnerabilidad | Tagged | Leave a comment

Malware infections by Locky, Dridex, and Angler drop — but why?

Some of the internet’s biggest malware factories have stopped producing — but the battle is not over. The number of network infections generated by some of the most prolific forms of malware — such as Locky, Dridex, and Angler — … Continue reading

Posted in Cyber Security, Malware | Tagged , | Leave a comment

Sirin Labs’ Solarin isn’t for pro-privacy bankers. It’s for rich execs who want bling

‘Advanced technology for those where cost is not an issue’. El Reg got hands-on with the Solarin $14,000 ultra-high-end Android smartphone during a trip to Tel Aviv this week. As previously reported, the Solarin handset is an Android-based smartphone pitched … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

PMO gets complaint: Essar allegedly tapped Ambani brothers, Suresh Prabhu, Vajpayee PMO staff

During 2001-06, Essar tapped ministers, industrialists, bureaucrats, says SC lawyer; Essar calls it baseless charge. For five years, between 2001 and 2006 — spanning one NDA and one UPA government — the Essar Group allegedly tapped several telephones of VVIPs, … Continue reading

Posted in Cyber Security | Tagged , , | Leave a comment