Akamai acquires identity management company Janrain
2019 has barely begun, but security and content delivery specialist Akamai has already taken a first step. Akamai announces this week that it has taken over the identity management company Janrain.
With the acquisition, the security and content delivery specialist will become a player that helps org... Read more
NSA makes reverse-engineering tool GHIDRA open source
The U.S. National Security Agency (NSA) plans to create a framework for the reverse engineering of popular operating systems in the spring open source. It's the GHIDRA framework, reports Silicon Angle.
The framework works by breaking down software into assembly code so that people can analyze it. Th... Read more
Vulnerability in Skype makes bypassing lock screen Android possible
There was a bug in Skype that made it easy to bypass Android security. It's the combination of bad design and a bug that made it possible to bypass Android's locking screen by answering a Skype call.
That's what nineteen-year-old bughunter Florian Kunushevci reports to The Register. The bughunter di... Read more
Trend Micro finds connection between Emotet, Ursnif, Dridex and BitPaymer malware families
Trend Micro researchers have found a connection between four malware families, suggesting that the families are working together to develop more advanced attack vectors. It concerns Ursnif, Emotet, Dridex and BitPaymer.
An analysis of the four families revealed a similar loader and decryption proced... Read more
Password manager leaks data to millions of users after wrong cloud configuration
Abine, the company behind Blur's password manager and DeleteMe's online privacy protection service, has revealed a data breach that has an impact on nearly 2.4 million users of the password manager. That's what ZDNet reports. The data of these users was published online due to incorrect configuratio... Read more
USB-IF comes with USB-C solution for protection against malicious devices
The USB Implementers Forum (USB-IF) has announced the launch of its USB Type-C Authentication Program. The specification defines cryptography-based authentication for USB-C chargers and devices.
USB-IF is a non-profit organization working on the promotion and adoption of USB technology. The new pro... Read more
Hackers threaten to publish insurance documents from 9/11
A hacker group called The Dark Overlord announced Monday that it had hacked into a law firm. This law firm handles cases related to the attacks of 9 September 2001. The hackers now threaten to publish a large number of internal files, unless a ransom is paid.
The Dark Overlord announced the attack ... Read more
Hacker finds zero-day to overwrite files in Windows 10
A hacker has found a new way to break into the Windows 10 app security model. SandboxEscaper, who has been able to find three zero-day bugs in Windows over the past four months, has found another one. This is an error that makes it possible to overwrite files.
The security researcher published on th... Read more
Ransomware flattens networks of several major American newspapers
Last weekend, the printing works and deliveries of several large American newspapers came to a standstill. This is due to an attack that may have been carried out with the Ryuk-ransomware. The attack had an impact on, among others, printers of Tribune Publishing, one of the largest publishers of reg... Read more
Urgent update of Internet Explorer disables certain Lenovo laptops
A few days ago, Microsoft released a rush update for Internet Explorer. That patch ensured that a zero day vulnerability could no longer be exploited by malicious parties. But now it appears that the spoedupdate has unforeseen consequences: some Lenovo laptops do not start up after installing the pa... Read more