Gaana.com — One of India’s most popular music streaming service with more than 10 Million registered users and 7.5 Million monthly visitors — has reportedly been hacked, exposing the site’s user information database.
Read more here.
Gaana.com — One of India’s most popular music streaming service with more than 10 Million registered users and 7.5 Million monthly visitors — has reportedly been hacked, exposing the site’s user information database.
Read more here.
Part 3 of a nice article on how to assess the security of mobile applications.
Read more here.
Is your home or work wireless network just waiting for an attacker to waltz in? Your router can have plenty of vulnerabilities – weak password, weak encryption standards, dangerous services, etc.
The free Android app RouterCheck looks for all that and more. It also checks your router make and model to see whether it’s known to have vulnerabilities.
Read more here.
Even though Google started the whole mobile payment thing years ago with Google Wallet, it never really took off with the masses. Google’s newly announced Android Pay, however, might. Just like Google Wallet, Android Pay lets you simply tap your phone on an NFC terminal to make a purchase, but with a little less hassle — there’s no need to enter in a PIN to enable payments.
Read more here.
On May 20, 2015, CareFirst BlueCross BlueShield announced that it was the latest victim of a major cyberattack, with as many as 1.1 million plan customers affected. Current and former CareFirst members and individuals who do business with CareFirst online who registered to use CareFirst’s websites prior to June 20, 2014 are impacted by this event.
Read more here.
An often overlooked feature of log management software is the ability to conduct forensic analysis of events. Instead of searching for a needle in a haystack, forensic analysis tools can make drilling down to identify details a quick and easy task.
Read more here.
Just after a new security vulnerability surfaced Wednesday, many tech outlets started comparing it with HeartBleed, the serious security glitch uncovered last year that rendered communications with many well-known web services insecure, potentially exposing millions of plain-text passwords.
But don’t panic. Though the recent vulnerability has a more terrific name than HeartBleed, it is not going to cause as much danger as HeartBleed did.
Dubbed VENOM, stands for Virtualized Environment Neglected Operations Manipulation, is a virtual machine security flaw uncovered by security firm CrowdStrike that could expose most of the data centers to malware attacks, but in theory.
Yes, the risk of Venom vulnerability is theoretical as there is no real-time exploitation seen yet, while, on the other hand, last year’s HeartBleed bug was practically exploited by hackers unknown number of times, leading to the theft of critical personal information.
Read more here.
According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to reach $96.3 billion by 2018.
Read more here.
Wapiti is a web application vulnerability scanner, it allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the web pages of the deployed web application, looking for scripts and forms where it can inject data.
Read more here.
More than 95 percent of enterprise SAP installations exposed to high-severity vulnerabilities that could allow attackers to hijack a company’s business data and processes, new research claims entirely.
According to a new assessment released by SAP solutions provider Onapsis, more than 250,000 SAP business customers worldwide, including 98 percent of the 100 most valued brands, are vulnerable for an average of 18 months period from when vulnerabilities surfaced.
Read more here.