Tag Archive for: addresses

To avoid NSA, Cisco gear gets delivered to strange addresses

One of the most successful U.S. National Security Agency spying programs involved intercepting IT equipment en route to customers and modifying it.

At secret workshops, backdoor surveillance tools were inserted into routers, servers and networking equipment before the equipment was repackaged and sent to customers outside the U.S.

The program, run by the NSA’s Tailored Access Operations (TAO) group, was revealed by documents leaked by former NSA contractor Edward Snowden and reported by Der Spiegel and Glenn Greenwald.

To read this article in full or to leave a comment, please click here

Network World Security

Google addresses WebView security concerns, makes recommendations on … – Android Authority (blog)


Android Authority (blog)

Google addresses WebView security concerns, makes recommendations on
Android Authority (blog)
If you are still waiting for Google to do something about the WebView vulnerabilities in older Android releases, you may not be a fan of their official response to the matter. Google says they've already fixed it, sort of, but at least offered ways
Google Responds to Concerns Over Widespread Android WebView VulnerabilityNDTV
Google Leaves Some Android Users Vulnerable to HacksWall Street Journal (blog)

all 6 news articles »

“android security” – read more

53 million email addresses stolen in Home Depot breach

In addition to the 56 million credit cards exposed in the recent breach at Home Depot, investigators have now revealed that more than 53 million email addresses were stolen too.
Naked Security – Sophos

Thousands of Mozilla developers’ e-mail addresses, password hashes exposed

E-mail addresses and cryptographically protected passwords for thousands of Mozilla developers were exposed through a database glitch that may have been exploited by hackers, Mozilla officials warned Friday.

About 76,000 e-mail addresses and 4,000 password hashes were left on a publicly accessible server for about 30 days beginning June 23, according to a blog post. There is no indication the data was accessed, but Mozilla officials investigating the disclosure can’t rule out the possibility. Hackers who might have managed to crack the hashes wouldn’t be able to use the passwords to access Mozilla Developer Network accounts, but they may be able to access other user accounts secured with the same cracked passcode. The glitch was touched off when a data “sanitization” process failed, causing the addresses and hashes to be dumped to a publicly accessible server.

“We are known for our commitment to privacy and security, and we are deeply sorry for any inconvenience or concern this incident may cause you,” Stormy Peters, director of developer relations, and Joe Stevensen, operations security manager, wrote. They continued:

Read on Ars Technica | Comments


Ars Technica » Technology Lab