HackDig : Dig high-quality web security articles for hacker

Security Affairs newsletter Round 2 – Best of the week from best sources

2015-03-30 18:10

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Just a unicode string of 13 characters to crash Mac Chrome tab
Chrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own Competition
PoSeidon the most sophisticated PoS malware until now
Islamic State doxes US soldiers, airmen, calls on supporters to kill them
CONNECTED CARS: Which are risks for automated vehicles?
Australian online voting system may have FREAK bug
ISIS cell calls on supporters to kill 100 US military personnel
New Dridex malware evades detection with AutoClose function
Fake patient data could have been uploaded through SAP medical app
Swedish city demands £40,000 to repair teenage hacking spree
Simplest Way to Check If Your Emails Are Being Tracked
Ghost blogging platform affected by multiple vulnerabilities
Hilton website flaw let hackers hijack any Honor member’s account
Phishers Leverage .gov Domain Loophole to Bypass Email Validation
Millions of computers left vulnerable to BIOS chip hack
DDoS Attackers Distracting Security Teams With Shorter Attacks: Corero Networks
Twitch stitch-up! Game vid stream biz hacked, passwords wiped
Chrome for Mac no longer crashes when loading strings that can’t be named
njRAT Infections on the Rise: Security Firms
Adobe CVE-2011-2461 flaw is exploitable by 4 years although it was fixed
Wind turbine blown away by control system vulnerability
BlackHat talk hibernated over 0-day in SAPs Afaria mobile manager
Dell denies insecure autoupdate app flings open PC backdoor
Hilton Honors accounts exposed due to a CRFS flaw
Chinese CA issued bogus digital certificates for Google domains
Worst data breaches of 2014
Twitch resets user passwords following breach
Mobile security: IBM/Ponemon study finds enterprise app security weaknesses
Twitch Data Breach Exposes User Passwords, Other Information
Raketu Intros Secure, Private Moblle Messaging App
Google warns of unauthorized TLS certificates trusted by almost all OSes [Updated]
Malicious user hides trojan links in cloned Steam Greenlight pages
New Secure Online Check-Out Tech Goes For Less Friction, More Biometrics
Retailers Adopt Intel-Sharing Portal Used By Banks
Ransomware holds schools hostage: Now give us Bitcoin worth $129k, er, $124k, wait …
Instagram API could be exploited to serve malicious links
The Installer Hijacking vulnerability exposes 1 of 2 Android users to attack
BT Home Hub SIP backdoor blunder blamed for VoIP fraud
Discovering who is tracking your emails with UglyEmail
BitWhisper – hacking Air-Gapped PCs through heat emissions
House Intelligence Committee Introduces Cyber-Threat Sharing Bill
Security best practices for users is your first line of defense
Vawtrak malware uses steganography to hide update files in favicons
Samsung forgets fingerprints, focuses its eye on YOURS
Cisco patches IOS to stop automation exploitation
Setting issue in Windows 7 and 8.1 could allow privilege escalation
Slides reveal Canadian CSE secret hacking capabilities
How a hack on Prince Phillips Prestel account led to UK computer law
How I hacked my smart bracelet
Cisco Fixes DoS Vulnerabilities in IOS Software
GE Fixes Buffer Overflow Bug in DTM Library
Tinder hack sets heterosexual men up with each other
Denial of Service and Memory Vulnerabilities Patched in Cisco IOS
North Korea Denies Hacking Nuclear Plants in South
PayPal settles over WMD sanction-breaking transaction claims
Crooks are improving sextortion with the use of mobile malware
Multiple Vulnerabilities Patched in pfSense
MIT Researchers Debut Debugger for Integer Overflows
The things end users do that drive security teams crazy
PhishMe Raises $13 Million
Health records are the new goldmine for hackers
Hotel ANTLabs InnGate Internet Gateways vulnerable against remote exploit
Vulnerability in Hotel WiFi Network Exposes You to Hackers
Flaw in common hotel router threatens guests’ devices
Android apps track your location every three minutes, says Carnegie Mellon study
Schneider Electric Fixes Vulnerabilities in HMI Products
GitHub Hit With DDoS Attack
Is China responsible for Massive DDoS Attack against GitHub?
A critical MiTM flaw in AFNetworking iOS, OS X framework was fixed
Nigerian Electoral Commission Website Hacked
Iran increased cyber-security spending 12-fold since 2013

Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.


 

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)

The post Security Affairs newsletter Round 2 – Best of the week from best sources appeared first on Security Affairs.


Source: lmth.20-rettelswen-sriaffa-ytiruces/swen-gnikaerb/55453/sserpdrow/oc.sriaffaytiruces

Read:2033 | Comments:0 | Tags:Breaking News cyber security Newsletter SecurityAffairs

“Security Affairs newsletter Round 2 – Best of the week from best sources”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud