| | | | Security Watch August 7, 2013 | | | | TOP STORIES Don't Plug Your Phone into a Charger You Don't Own This news couldn't wait for the Black Hat conference happening now in Las Vegas. We reported in June that Georgia Tech researchers had created a charging station that could pwn any iOS device. The full presentation revealed precise details on how they managed it. I'm never plugging my iPhone charger into a USB port in a hotel desk again. Share This: Xkeyscore Isn't Watching You, It's the NSA's Google for Intercepted Data Yesterday, the Guardian released a series of documents outlying an NSA program called Xkeyscore. We learned a lot about it, including its groan-worthy 3Dt text art logo. It was clear that Xkeyscore could do a lot, and had access to an incredible amount of information. However, it might not be exactly what we thought. Share This: Intercepting Calls and Cloning Phones With Femtocells Researchers from iSec Partners demonstrated how they exploited a vulnerability in the way mobile devices connected to a femtocell, a miniature cell tower, to eavesdrop on people's conversations and impersonate their phones. If this sounds scary, it should. Share This: Multiple "Master Key" Vulnerabilities Afflict Android It all started as a prank, explained Bluebox Security's Jeff Forristal. It eventually led the team to the weakness they dubbed "Master Key". "This topic has already been covered," said Forristall. "It leaked. It's been out for a few weeks. But actually there's more than one master key, so this talk grew from one bug to four." Share This: Didn't Make it to Black Hat? Watch NSA Director General Keith Alexander's Keynote Speech In the midst of the ongoing controversy about PRISM, Xkeyscore, and government surveillance, NSA director General Keith Alexander delivered the keynote speech at Black Hat 2013. The speech wasn't without its hiccups, but it is a look at a completely different perspective on security. Share This: Building a Million Browser Botnet for Cheap In a presentation at Black Hat in Las Vegas, Jeremiah Grossman, founder and CTO of WhiteHat Security, and Matt Johansen, manager of WhiteHat's Threat Research Center, revealed an extraordinarily simple way anyone can control of thousands or even millions of browsers. Share This: Mobile Threat Monday: Smurfs 2, Black Hat, and Beyond Just because practically the entire infosec community decamped to Las Vegas for the annual Black Hat security conference and DEF CON hacker jamboree last week does not mean we can stop worrying about malicious mobile apps. Share This: Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here: FEATURED OFFERS | | AWARD-WINNING TECH now on sale! |
| | | eNewsletter Information You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter. To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here. Copyright ©2013 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016 | |
ไม่มีความคิดเห็น:
แสดงความคิดเห็น