Security Affairs newsletter Round 5 – Best of the week from best sources

Pierluigi Paganini April 19, 2015

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Darwin kernel, just an IP packet to cause the crash of Apple devices
How far do stolen data get in the deep web after a breach?
NSA dreams of smartphones with split crypto keys protecting user data
FireEye Uncovers Decade-Long Cyber Espionage Campaign Targeting South East Asia
Hackers took over social media accounts of Iranian state Al Alam TV
ɘƨɿɘvɘЯ algo attack cracks Belkin router WPS PINs: researcher
NSA: Back doors are a bad idea, give us a FRONT door key
APT30 behind a long-running cyber espionage campaign
Attacks Against SCADA Systems Doubled in 2014: Dell
Australian government issues warning over ‘ISIS hacks’
USB Type-C: Could new laptop ports be a malware entry point?
Encryption Increases Its Popularity and US Is in a Dilemma
Dabbling in two-factor authentication can be dangerous
How big a problem is Cloud security?
Great Cannon: Attack Tool Used by China for Censorship Enforcement
Redirect to SMB flaw affects all versions of windows
Verizon to world: STOP opening dodgy phishing emails, FOOLS
Turkish hackers took down Vatican City site for revenge against Pope’s words
US-CERT Warns of Issues With DNS Zone Transfer Requests
CoinVault Ransomware Decryption Tool Released
Microsoft Patches Critical HTTP.sys Vulnerability
Dell report revealed attacks on SCADA system are doubled
SearchBlox Fixes XSS, File Upload Flaws
Lawyer claims police placed malware on requested external hard drive
Popular AirDroid App Vulnerable to Authentication Flaw: Researchers
How secure is your smartwatch?
D-Link router patch creates NEW SOHOpeless vuln
Chrome starts pushing Java off the Web by deprecating NPAPI
Target settles with MasterCard for US$19 million
Borg routers open to repeat remote DoS attack
France Televisions hacked and 100,000 contacts stolen
New malware program Punkey targets point-of-sale systems
DEA, US Army bought $1.2M worth of hacking tools in recent years
Security pros name their must-have tools
Hackers could control planes over in-flight Wi-Fi, warns US government
AirDroid app fixes severe authentication vulnerability
Google Rewards Researchers for YouTube Comment Theft Vulnerability
APT group hacks cyber-spy gang in spy-on-spy pwnage
Microsoft Zero-Day Bug Being Exploited In The Wild
Lawyer Finds Hard Drive Sent Over by Police to Be Infected with Trojan for Spying
Iran Poses Growing Cyber Threat to US: Study
Ransomware Teslacrypt Still Targeting Gamers
BrandPost: Making the Case for Cloud Security in Government
Operation Pawn Storm Continues to Step Up Attack Activity
WikiLeaks Dumps Data from Sony Hacking Scandal
Is the US cyber command ready for Information Warfare?
In-flight Wi-Fi can be an open door for hackers
Wikileaks released documents from Sony hack, the company condemned it
USB Defense: Stop Data Walking Out The Door
WW2 German Enigma machine auctioned for record-breaking price
MS15-034 flaw leaves over 70 million sites vulnerable to cyber attacks
Lost Your Phone? Google Search Find My Phone To Locate It
Minecraft exploit makes it easy for hackers to crash servers
Wikileaks Publishes 30,000 Searchable Documents from the Sony Hack
Recently Patched Windows Flaw Exploited in the Wild for DoS Attacks
How to move YouTube comments from any video to another
Attacks against industrial control systems double
Teenagers Suspected of Hacking Belgian and French Websites
ISIS online strategies and recruiting techniques
Faked Flash-based ads on HuffPo, other sites downloaded extortionware
Emails and documents leaked during Sony hack released by WikiLeaks
Inside the 4 Most Common Threat Actor Tools
APT Group Pawn Storm Ratchets Up Attacks
No joke: Google’s April Fool’s prank inadvertently broke site’s security
Java – New vulnerabilities affects million applications
TheRealDeal black Marketplace Offers Zero-Day Exploits
New Google Security Chief Looks for Balance with Privacy
PayPal Wants To Integrate Password with Human Body
Safari cookie access vulnerability affects a billion iThings
Russia-linked Hackers Used Two Zero-Days in Recent Targeted Attack: FireEye
Russian Hackers Used Two Zero-Days in Recent Targeted Attack: FireEye

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

 

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)



you might also like

leave a comment