Security Affairs newsletter Round 6 – Best of the week from best sources

Pierluigi Paganini April 26, 2015

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Google To Speed Up The Internet With Its New QUIC Protocol
APT28 Russian hackers exploited two zero-day flaws in the wild
Security Affairs newsletter Round 5 – Best of the week from best sources
Researcher who joked about hacking a jet plane barred from United flight
Punkey, a new POS Malware in the criminal ecosystem
Raytheon suspected of readying for Websense slurp
The Interpol designs its own virtual currency scheme, for crime prevention
Operation Pawn Storm on Continued Marathon, Attacking Targets Now with Advance Infrastructure
How to use a malicious JPEG to hack corporate networks
Mt Gox LEAKED Bitcoin for years before heist, says WizSec
1,500 iOS apps have HTTPS-crippling bug. Is one of them on your device?
Nork hackers no pantomime villains, but a hugely unpredictable menace
Apple Failed to Patch Rootpipe Mac OS X Yosemite Vulnerability
The hacker Stefan Esser shows the jailbreak for iOS 8.4 beta 1
Smart city systems could become a nightmare for security
Google Ads will pass to be fully encrypted
Zero-Day Malvertising Attack Went Undetected For Two Months
Renewed Attention on Android Apps Failing SSL Validation
White House cyber-general says US must be able to cyber-nuke the worst of the cyber-worst
OS X Yosemite still open to Rootpipe hijacking, says ex-NSA bod
The CozyDuke APT
Accuvant, FishNet to Become Optiv Security
NetNanny Found Using Shared Private Key, Root CA
Crypto ‘Front Door’ Debate Likely to Go On For Years
Spy in the sandbox attack to spy on your online activity
Pushdo spamming botnet still active in the wild
Hyatt resets Gold Passport passwords after security incident
Senate leader introduces bill to extend Patriot Act surveillance
Republicans in sneaky bid to reauthorize Patriot Act spying until 2020
SSL certificate flaw allows hackers to crash devices running iOS 8
Malware used in White House and State Department hacks possibly linked to Russia
iOS bug sends iPhones into endless crash cycle when exposed to rogue Wi-Fi
CozyDuke hackers targeting prominent US targets
Hackers spy on Kansas family through unsecured baby monitor
Canada commits $36.4 million to cybersecurity measures in 2015 budget
Drug dealer: Cops leaned me over 18th floor balcony to get my password
How to hack Avaya phones with a simple text editor
CipherCloud Cloud Offering Helps Organizations Tame Shadow IT
POS vendor uses same password – 166816 – non-stop since 1990
Evil Wi-Fi kills iPhones, iPods in range – No iOS Zone SSL bug revealed
Phasebot, the fileless malware sold in the underground
Google Project Fi Wireless Service: 10 Amazing Facts
Microsoft Prepared to Pay Up to $15,000 for Spartan, Azure Vulnerabilities
The CozyDuke, the last Russian APT group
Samsung Galaxy S5 could be open to fingerprint theft
Microsoft kicks off two-month Spartan bug bounty program
US House approves cyberthreat sharing bill; privacy concerns remain
Insider threats force balance between security and access
Study: Firms not ready to respond to complex threats
Costa Coffee Club members wake up and smell the data breach
US House Clears Cybersecurity Bill
Mobile Malware Not a Big Problem in US: Damballa
Wi-Fi SSID names could allow to crash or hack mobile devices
Bypassing OS X Security Tools is Trivial, Researcher Says
Pentagon Seeking Brains and Ideas in Silicon Valley
How to discover NSA Quantum Insert attacks on your systems
SSL certificate parsing vulnerability could force iOS devices into endless reboot loop
Ransomware creators are laundering their Bitcoin rapidly since the currency value is dropping
Login Vulnerability Exposes SAP ASE Databases
Magento Flaw Exploited in the Wild a few hours after disclosure
IRC Botnets Continue to Evolve: Zscaler
Point-of-Sale vendor has used the same admin password for 25 years
RSA Conference 2015 Wraps Up
48,000 Windows XP PCs are still running at TEPCO … which are the risks?
Critical SSL Vulnerability Leaves 25,000 iOS Apps Vulnerable to Hackers
Tor-Based Dark Web Email Service Targeted by Government Spies
Trains controlled by European Rail Traffic Management System could potentially be hacked
Point-of-Sale malware on the rise, the opinion of the expert
RSA Conference 2015: too much technology and not enough people?

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)



you might also like

leave a comment