Vulnerable medical equipment details disclosed online

Vulnerable hospital equipment details can be found online, two security researchers have found.

Update Flash now! Adobe releases patch, fixing critical security holes

It’s time to update Flash once again, and don’t forget to reduce the attack surface by enabling “Click to Play”… or uninstall it altogether.

Multiple vulnerabilities identified in Belkin router

An expert says that a popular Belkin router contains numerous vulnerabilities, making it extremely susceptible to attacks.

iOS vulnerability Ins0mnia fixed by Apple

Apple has resolved a serious security vulnerability known as Ins0mnia in its latest update.

Dolphin and Mercury Android browsers have major vulnerabilities

Dolphin and Mercury Android browsers have major vulnerabilities, allowing for remote code execution and arbitrary reading and writing of files.

MumsNet hit by hack, DDoS attack and SWAT

Mumsnet, the phenomenally popular British parenting website, has suffered an attack from hackers which has seen users’ accounts breached, and passwords stolen. And the damage doesn’t end there…

Researchers win Internet Defense Prize for C++ detection tool

Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.

Firefox Under Fire: Anatomy of latest 0-day attack

The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.

ICO investigating major data breach at Carphone Warehouse in the UK

The Information Commissioner’s Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.

20,000 NHS Wales PCs still running Windows XP from beyond the grave

An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.

Is that really an appropriate level of security for computers that could be holding patients’ medical information?

Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals

As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

433,000 Ford cars to be recalled because of software bug – would you have preferred an internet update?

Cars which are capable of receiving instructions via the internet (such as software updates) are potentially more at risk of being hacked or meddled with than those which don’t.

Cyber risk analysis, assessment, and management: an introduction

Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.

Millions of WordPress sites left vulnerable by plugin flaw

Millions of WordPress sites are vulnerable to a scripting flaw found in two popular plugins, one of which can be found in the default installation of the blogging platform.

Hilton HHonors accounts put at risk of hijacking through simple web flaw

Security researchers discovered a vulnerability on the Hilton HHonors website, making it straightforward to hijack any other user’s account.

Cisco vulnerability could allow attackers to eavesdrop on private conversations

A vulnerability in Cisco’s SPA300 and SPA500 IP phones could allow hackers to eavesdrop on private conversations from anywhere in the world, reports The Register.

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.

Thunderstrike! How a radar-proof rootkit could infect your Mac

A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.

Unpatched security hole has left millions of Moonpig customers at risk for 17 months

Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.

Tor Network warns of potential attack

Is the Tor Network about to be knocked offline? Insiders certainly seem to think so as intelligence of a credible threat against the network’s relays has been received. Is this a genuine threat to the Tor Network’s ability to function?

Follow us

Copyright © 2015 ESET, All Rights Reserved.