from on (#FSJF)
Canadian government and law enforcement officials are scrambling to figure out how Anonymous got their hands on what the hacker collective calls cabinet-level secrets.
|
Story
Some PDFs from Blackhat 2015Similar News
by LXer from LinuxQuestions.org on (#FRGG)
Published at LXer: Today’s review is of BackBox 4.3, the latest edition, which is based on Ubuntu 14.04 and ships with its own suite of security-focused applications. This puts it in the same niche...
|
CentOS has updated clutter (C7:screen lock bypass) and qemu-kvm (C7: two vulnerabilities).Debian-LTS has updated icu(code execution).Mageia has updated chromium-browser (MG4,5: multiplevulnerabilities), expat (MG4,5: denial ofservice), icu (MG5; MG4: denial of service/code execution), stunnel (MG5: authentication bypass), thunderbird (MG4,5: multiple vulnerabilities),wesnoth (MG5; MG4: information leak), and wordpress (MG4: two vulnerabilities).Oracle has updated clutter (OL7:screen lock bypass) and qemu-kvm (OL7: two vulnerabilities).Red Hat has updated clutter(RHEL7: screen lock bypass).Scientific Linux has updated clutter (SL7: screen lock bypass) and qemu-kvm (SL7: two vulnerabilities).SUSE has updated xen (SLE12; SLE11SP4: two vulnerabilities).Ubuntu has updated apache2(15.04, 14.04, 12.04: two vulnerabilities), kernel (15.04; 14.04:multiple vulnerabilities), linux-lts-trusty(12.04: multiple vulnerabilities), linux-lts-utopic (14.04: multiplevulnerabilities), and linux-lts-vivid(14.04: multiple vulnerabilities).
by Frederic Lardinois from Crunch Hype on (#FP93)
Starting today, developers who use Google’s Compute Engine infrastructure as a service platform will be able to bring their own security keys to the service. Google argues that using these customer-supplied encryption keys, which are now in public beta, give its users more control over their data security.By default, Google encrypts all of the data on its service with an AES-256 bit… Read More
|
from heise online News on (#FNHK)
Die Gefahren und andererseits die Möglichkeiten zum Schutz und der Prävention vor Cyberangriffen sind das zentrale Thema der 2. Konferenz zur Cyber Security Challenge Germany Mitte September in Berlin.
|
by LXer from LinuxQuestions.org on (#FN2F)
Published at LXer: Cybersecurity experts aren't like you or I, and now we have the evidence to prove it. Researchers at Google interviewed more than 200 experts to find out what security practices...
|
by Blue from Blue's News on (#FJQN)
Valve has closed up a Steam security hole that allowed for the hijacking of user accounts with minimal effort, which caused temporary account loss for some prominent streamers and DOTA 2 pros,...
by Dustin Childs from Crunch Hype on (#FM4V)
When it comes to data security, we hear a lot about how cyber attackers are becoming more sophisticated or that cloud technology is full of risks. While these statements are true to some extent, both can be convenient excuses hiding a harsher truth. Today, neglect is actually one of the biggest threats to corporate data. Read More
|
Debian has updated expat (code execution), lxc (two vulnerabilities), and openjdk-7 (multiple vulnerabilities).Debian-LTS has updated expat(code execution), ghostscript (buffer overflow), and lighttpd (man-in-the-middle attack).Mageia has updated apache (MG4,5:two vulnerabilities), java-1.8.0-openjdk(MG5: multiple vulnerabilities), libuser(MG4,5: two vulnerabilities), and mariadb(MG4,5: multiple vulnerabilities).openSUSE has updated cacti (13.2,13.1: SQL injection), Chromium (13.2, 13.1:multiple vulnerabilities), java-1_7_0-openjdk (13.2, 13.1: multiplevulnerabilities), and java-1_8_0-openjdk(13.2: multiple vulnerabilities).Red Hat has updated chromium-browser (RHEL6: multiplevulnerabilities) and qemu-kvm (RHEL7: two vulnerabilities).
by Jason Burke in Delhi from World news | The Guardian on (#FJ8F)
Indian home minister vows ‘befitting reply’ and Pakistan condemns incident near border that left at least 10 dead, including three gunmenSecurity forces are on high alert in cities across India after gunmen attacked a police station, killing at least seven people in the north-western state of Punjab.Authorities said four police officers and three civilians had been confirmed dead in the siege, and eight more injured. All three of the attackers died. Continue reading...
|
by Sean Gallagher from Ars Technica - All content on (#FK8M)
Move is part of government effort to expand monitoring of communications.
|
by Kyle Orland from Ars Technica - All content on (#FK43)
Attacker could steal account with nothing but a username.
|
from Techreport on (#FJP5)
Some Steam accounts were stolen during the period from July 21 to July 25 due to a security flaw in the service's password reset procedure, Kotaku reports. The hole, which Valve learned of on July 25, allowed an attacker to reset a Steam account's password without a security code using only the account's name. Valve claims it has since closed the security hole.This YouTube video shows how the attack worked. This user then ...Read more...
by Guardian Staff from World news | The Guardian on (#FJ2K)
Indian security forces exchange fire with gunmen in the town of Gurdaspur in Punjab, northern India, near the border with Pakistan, after they fired shots at a bus station and took control of a police station. At least five people have been killed in the siege, and several more injured. Police try to disperse panicking crowds, who came out onto the street after hearing the gunfire Continue reading...
|
by Peter Beaumont in Jerusalem from World news | The Guardian on (#FHXR)
Mohammad Abu Latifa, 20, becomes third Palestinian in a week to be killed by IDF after he was shot and fell from a roofA Palestinian man has died during an attempted arrest by Israeli security forces, in the third such fatal incident in less than a week.
|