Archive for Recommended Reading – Page 7

Drupal warns unless you patched within seven hours, you’re hacked

Drupal’s security team has released a “public service announcement” calling upon all users of the Drupal content management framework to consider their sites as compromised, and to start afresh, unless their sites were patched against the SQL injection attack revealed two weeks ago within seven hou

Feds identify suspected ‘second leaker’ for Snowden reporters

Edward Snowden, left, appears with Glenn Greenwald in a scene from the documentary Citizenfour. (Radius TWC/AP …The FBI has identified an employee of a federal contracting firm suspected of being the so-called “second leaker” who turned over sensitive documents about the U.S.

Verizon’s ‘Perma-Cookie’ Is a Privacy-Killing Machine

Verizon Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between these customers and the websites they visit.

Google beefs up 2-step verification with physical USB Security Key option in Chrome

Google today announced it is beefing up its two-step verification feature with Security Key, a physical USB second factor that only works after verifying the login site is truly a Google website.

Phone Hackers Dial and Redial to Steal Billions

SAN FRANCISCO — Bob Foreman’s architecture firm ran up a $166,000 phone bill in a single weekend last March. But neither Mr. Foreman nor anyone else at his seven-person company was in the office at the time. “I thought: ‘This is crazy. It must be a mistake,’ ” Mr. Foreman said.

Lessons cyberdefense may be able to teach us about managing Ebola

We in the computer world are all too familiar with what we’ve long called “viruses,” the malware that infects our machines and networks.

Obama signs order boosting credit, debit card security after spate of bank breaches

Responding to the rising number of data breaches at US retailers, President Obama on Friday signed an executive order that will implement enhanced payment security measures throughout the federal government.

Google reveals major flaw in outdated, but widely-used SSL protocol

Google’s Security Team revealed on Tuesday that the long obsolete, but still all too used, Secure Sockets Layer (SSL) 3.0 cryptographic protocol has a major security flaw. While SSL 3.0 has been succeeded by Transport Layer Security (TLS) 1.0, TLS 1.1, and TLS 1.

Secret ad beacon network uncovered, shut down in New York City

For almost a year, a company called Titan has operated a network of advertising beacons, devices that are capable of identifying nearby smartphones and which are often used to push advertisements and information to them, installed within pay phone booths throughout New York City without the knowled

AT&T Hit By Insider Breach

AT&T is warning consumers about a data breach involving an insider who illegally accessed the personal information of an unspecified number of users. The compromised data includes Social Security numbers and driver’s license numbers.