New Data Reveals Yahoo’s Post-Breach Failings – ISBuzz News

 Computer Security  Comments Off on New Data Reveals Yahoo’s Post-Breach Failings – ISBuzz News
Sep 282016
 

ISBuzz News

New Data Reveals Yahoo's Post-Breach Failings
ISBuzz News
For example Flame, a family of malware used for targeted espionage by nation states, relied on an MD5 vulnerability. All of the MD5 certificates in use by Yahoo! today and many of the other certificates Venafi Labs evaluated are self-issued. One

flame malware – read more

Senators Demand Timeline of Yahoo’s Handling of Massive Data Breach – ABC News

 Internet Security  Comments Off on Senators Demand Timeline of Yahoo’s Handling of Massive Data Breach – ABC News
Sep 282016
 

The Consumerist

Senators Demand Timeline of Yahoo's Handling of Massive Data Breach
ABC News
In a letter to Yahoo CEO Marissa Mayer today, six Democratic senators have asked the tech company to provide further details of a massive data breach the company revealed last week, including when exactly the company became aware of it. Since the hack …
Will Yahoo's Data Breach Help Overhaul Online Security?[email protected]
Yahoo Data Breach Could Extend Much FartherU.S. News & World Report
Yahoo Facing Lawsuits, Senate Inquiry, Possibly Merger Issues After Massive Data BreachThe Consumerist
Computerworld –NBC Southern California –Investopedia –Yahoo – Tumblr
all 515 news articles »
“data breach” – Google News

What a real cyber war would look like – USA TODAY

 Internet Security  Comments Off on What a real cyber war would look like – USA TODAY
Sep 282016
 

USA TODAY

What a real cyber war would look like
USA TODAY
SAN FRANCISCO – Both U.S. presidential candidates have vowed to take on the world when it comes to cyber warfare. But full-scale cyber retaliation might be hard to spot and even harder to count as a win. "Unlike a traditional war, there is no end where …
Cyber Warfare to Be One of Next US President's Biggest Challenges – ClintonSputnik International
Cyber history made at the first debatePolitico
Neither Trump Nor Clinton Know a Damned Thing About Cybersecurity, and Yes, You Should Be ConcernedReason (blog)

all 34 news articles »
cyber warfare – read more

Apple Calls In Rock Star iPhone And Mac Hackers For Secret Bug Bounty Bash

 Computer Security  Comments Off on Apple Calls In Rock Star iPhone And Mac Hackers For Secret Bug Bounty Bash
Sep 282016
 
A 19-year-old who was the first to jailbreak an iPhone 7. A former teenage prodigy turned world-renowned iOS hacker. An ex-NSA staffer who has repeatedly found Mac OS X security lacking. Luca Todesco, Nicholas Allegra and Patrick Wardle are just some of … mac hacker – BingNews

Down the rabbit hole, part 1: Making my life private and secure

 Computer Security  Comments Off on Down the rabbit hole, part 1: Making my life private and secure
Sep 282016
 

Over the years I’ve done a number of—let’s just call them “experiments in computering”—where I attempt to use my computers in such a way that is outside of my comfort zone. 

Living entirely in a terminal. Getting rid of all Google software and services. Using nothing but a version of FreeDOS. That sort of thing. 

I typically give myself the simple goal of “do it for 30 days, and see how it goes.” In the process, I always learn something—about what I like, about what is possible. And even if I don’t learn a cotton-pickin’ thing of value, it’s still kinda fun—kinda. 

To read this article in full or to leave a comment, please click here

Network World Security