Monthly Archives: June 2016

Hillary Clinton’s language about encryption echoes Apple

Clinton’s position on “back doors” and encryption appears to mirror Apple’s public statements. Democratic presidential candidate Hillary Clinton’s language about encryption echoes Apple takes part in a discussion during a campaign stop, Saturday, April 23, 2016, at the Orangeside On … Continue reading

Posted in Cyber Security | Leave a comment

IRS Shuts Down e-File PIN Tool After More Attacks

The U.S. Internal Revenue Service (IRS) announced last week that it has decided to shut down the electronic filing PIN tool on its website after detecting more automated attacks. The e-File PIN tool on IRS.gov allowed taxpayers to generate PINs … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no impact on security. The news is intriguing, while Apple announced the new release of its mobile operating system, the iOS 10, … Continue reading

Posted in Vulnerabilidad | Tagged , | Leave a comment

Swagger staggered as hacker drops dapper code execution cracker

Silent maintainers put on notice An unpatched remote code execution hole has been publicly disclosed in the popular Swagger API framework, putting users at risk. The client and server hole (CVE-2016-5641) exists in code generators within the REST programming tool, … Continue reading

Posted in Vulnerabilidad | Tagged | Leave a comment

Malware infections by Locky, Dridex, and Angler drop — but why?

Some of the internet’s biggest malware factories have stopped producing — but the battle is not over. The number of network infections generated by some of the most prolific forms of malware — such as Locky, Dridex, and Angler — … Continue reading

Posted in Cyber Security, Malware | Tagged , | Leave a comment

Sirin Labs’ Solarin isn’t for pro-privacy bankers. It’s for rich execs who want bling

‘Advanced technology for those where cost is not an issue’. El Reg got hands-on with the Solarin $14,000 ultra-high-end Android smartphone during a trip to Tel Aviv this week. As previously reported, the Solarin handset is an Android-based smartphone pitched … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

PMO gets complaint: Essar allegedly tapped Ambani brothers, Suresh Prabhu, Vajpayee PMO staff

During 2001-06, Essar tapped ministers, industrialists, bureaucrats, says SC lawyer; Essar calls it baseless charge. For five years, between 2001 and 2006 — spanning one NDA and one UPA government — the Essar Group allegedly tapped several telephones of VVIPs, … Continue reading

Posted in Cyber Security | Tagged , , | Leave a comment

Cisco wireless kits are affected by a critical bug but no fix is available

A security advisory recently released by CISCO announce that three Cisco wireless kits are affected by a critical bug, but no fix is available at the moment. SOHO devices are among most targeted network components in the wild, they are … Continue reading

Posted in Vulnerabilidad | Tagged | Leave a comment

Advanced phishing tactics used to steal PayPal credentials

Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials. One of the first lessons you will learn during anti-phishing training is to hover over the links in a mail to … Continue reading

Posted in Cyber Security, Malware | Tagged , | Leave a comment

‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.

The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the Hacking Team case?. After the hack of the controversial government spying and hacking tool vendor Hacking Team by an outside … Continue reading

Posted in Cyber Security, Software Testing company in Mexico | Tagged , | Leave a comment