View Post

Bethesda partners with Alamo Drafthouse to show ‘The Matrix’ and other films that inspired Prey

In Business, Gaming, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

Bethesda’s next major release is a science-fiction thriller, and the publisher is using film to reach an appreciative audience. The Alamo Drafthouse chain of movie theaters is kicking off a Bethesda Softworks Presents film series dedicated to the upcoming Prey reboot from developer Arkane Studios. Prey, which debuts May 5 for PlayStation 4, Xbox One, and PC, tells the story of Morgan, a lone human left on a space station called Talos I. As the subject of experiments, your character awakens to find that they (you can play as a man or a woman) must fight off an alien threat while uncovering what happened while they were asleep. In Prey, you’ll find a lot of familiar sci-fi themes, but Bethesda …

View Post

Hackers demand ransom from Apple for allegedly stolen iCloud data

In Business, Government, Healthcare, Legal, Security by Newsday Technology NewsLeave a Comment

Tech News Keywords: , , ,

A group of hackers claims to have breached Apple’s iCloud platform and gained access to hundreds of millions of user accounts. If Apple doesn’t pay a ransom, the hackers say they will remotely wipe the accounts. The hackers, who call themselves the “Turkish Crime Family,” are asking for $75,000 worth of bitcoin or Ethereum, or $100,000 in iTunes gift cards, Motherboard reported on Wednesday. To encourage Apple to pay, the hackers are seeking publicity by sending screenshots of alleged emails between them and Apple’s security team to media outlets. The hackers are threatening to reset some of the stolen iCloud accounts and remotely wipe victims’ devices if Apple doesn’t pay by April 7, according to Motherboard, which reported that the hackers didn’t …

View Post
Number of Items Identified: 12
Item #Item NameScoreItem Classification
1tabi (socks)0.623footwear, hosiery, tabi (socks)
2sock0.629
3hosiery0.631
4footwear0.637
5necktie0.615garment, neckwear, necktie
6neckwear0.634
7garment0.635
8claw0.609device, claw
9device0.661
10charcoal color0.938

What’s Wrong with Me?

In Business, Events, Government, Healthcare, Legal, Science & Nature, Security by New YorkerLeave a Comment

Tech News Keywords: , , , ,

Online, I found a welcoming sick ward of fellow-sufferers, and I started to live there.CreditIllustration by Anna and Elena Balbusso Illness narratives usually have startling beginnings—the fall at the supermarket, the lump discovered in the abdomen, the doctor’s call. Not mine. I got sick the way Hemingway says you go broke: “gradually and then suddenly.” One way to tell the story is to say that I was ill for a long time—at least half a dozen years—before any doctor I saw believed I had a disease. Another is to say that it took hold in 2009, the stressful year after my mother died, when a debilitating fatigue overcame me, my lymph nodes ached for months, and a test suggested that …

View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1woodshed1building, woodshed
2shed1
3building1
4chestnut color0.827
5brick red color0.749

Google takes Symantec to the woodshed for mis-issuing 30,000 HTTPS certs

In Business, Education, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: ,

Enlarge Nyttend reader comments 3 Share this story In a severe rebuke of one of the biggest suppliers of HTTPS credentials, Google Chrome developers announced plans to drastically restrict transport layer security certificates sold by Symantec-owned issuers following the discovery they have issued more than 30,000 certificates. Effective immediately, Chrome plans to stop recognizing the extended validation status of all certificates issued by Symantec-owned certificate authorities, Ryan Sleevi, a software engineer on the Google Chrome team, said Thursday in an online forum. Extended validation certificates are supposed to provide enhanced assurances of a site’s authenticity by showing the name of the validated domain name holder in the address bar. Under the move announced by Sleevi, Chrome will immediately stop displaying …

View Post

Israeli-American Arrested for Wave of JCC Threats

In Business, Education, Government, Legal, Security by Long Island PressLeave a Comment

Tech News Keywords: , , , , , , , ,

An Israeli-American teenager was arrested in Israel on Thursday as the main suspect behind scores of threats to Jewish Community Centers across the United States, according to reports. A spokesman for the Israeli police confirmed the arrest in a Tweet Thursday morning but did not identify the suspect. He said the suspect is 19 years old and had allegedly made threats to “Jewish organizations, communities & JCC bomb threats in US.” The suspect reportedly holds dual American and Israeli citizenship. Authorities have not yet released a motive. Authorities in Israel collaborated with the FBI during the investigation, the spokesman said. American law enforcement agencies had been looking into the threats for months. The Anti-Defamation League said there had been 165 …

View Post

New WikiLeaks docs show how the CIA hacks iPhones and MacBooks

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

New WikiLeaks docs show how the CIA hacks iPhones and MacBooks – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14800029″,”Entry Groups”:”front-page:apple:tech:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-23 11:08″,”Hour of Update”:”11″,”Publish Date”:”2017-03-23 11:08″,”Hour of Publish”:”11″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:apple:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”thursday”,”Hour of Day”:”11″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); …

View Post

Surging Bitcoin prices inspire a wave of scams

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: ,

Surging Bitcoin prices inspire a wave of scams – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14798627″,”Entry Groups”:”front-page:tech:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-23 08:50″,”Hour of Update”:”08″,”Publish Date”:”2017-03-23 08:43″,”Hour of Publish”:”08″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”thursday”,”Hour of Day”:”08″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); document.cookie = “umbel_api_key=lrjhazrpqbgtnrij; …

View Post

Apple says it hasn’t been breached after hacker group threatens to wipe millions of iPhones

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

Apple says it hasn’t been breached after hacker group threatens to wipe millions of iPhones – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14797105″,”Entry Groups”:”front-page:apple:tech:cyber-security”,”Author”:”Rich McCormick”,”Last Time Updated”:”2017-03-23 03:47″,”Hour of Update”:”03″,”Publish Date”:”2017-03-23 03:47″,”Hour of Publish”:”03″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:apple:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Rich McCormick”,”Logged in Status”:”Logged Out”,”Day of Week”:”thursday”,”Hour of Day”:”03″}]; window._umbel = window._umbel || []; (function() { var d = new …

View Post

Prosecutors think they can extract data from phones seized during Inauguration Day protests

In Business, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

Prosecutors think they can extract data from phones seized during Inauguration Day protests – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14794273″,”Entry Groups”:”front-page:apple:google:policy:us-world:tech:cyber-security”,”Author”:”Nick Statt”,”Last Time Updated”:”2017-03-22 19:50″,”Hour of Update”:”19″,”Publish Date”:”2017-03-22 19:50″,”Hour of Publish”:”19″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:apple:google:policy:us-world:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Nick Statt”,”Logged in Status”:”Logged Out”,”Day of Week”:”wednesday”,”Hour of Day”:”20″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() …

View Post

Employee passwords are behind massive security breaches

In Business, Gaming, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

Presented by Dashlane Yahoo, MySpace, Tumblr, and LinkedIn made headlines in the last 12 months for their enormous data breaches. Hackers released the data for 1.5 billion Yahoo accounts, 167 million LinkedIn users, 360 million user records on Myspace, and over 65 million Tumblr accounts. Even more striking is the number of weak passwords revealed during such data breaches. For instance, Facebook founder Mark Zuckerberg fell victim to a cyber hack when a group called OurMine Team discovered his credentials in the leaked data. It was later revealed that his password “dadada,” was used to protect his Twitter and Pinterest accounts. The recent mega breaches are not only unsettling in their magnitude, but they also illustrate the consequences poor password …

View Post

LastPass security flaw could have let hackers steal passwords through browser extensions

In Business, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

LastPass security flaw could have let hackers steal passwords through browser extensions – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14787103″,”Entry Groups”:”front-page:tech:cyber-security”,”Author”:”Colin Lecher”,”Last Time Updated”:”2017-03-22 12:45″,”Hour of Update”:”12″,”Publish Date”:”2017-03-22 12:45″,”Hour of Publish”:”12″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Colin Lecher”,”Logged in Status”:”Logged Out”,”Day of Week”:”wednesday”,”Hour of Day”:”12″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + …

View Post

Is Android security turning a corner?

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

Is Android security turning a corner? – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14784449″,”Entry Groups”:”front-page:google:tech:android:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-22 10:05″,”Hour of Update”:”10″,”Publish Date”:”2017-03-22 10:02″,”Hour of Publish”:”10″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:google:tech:android:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”wednesday”,”Hour of Day”:”10″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); document.cookie = “umbel_api_key=lrjhazrpqbgtnrij; expires=” + …

View Post

The Heat: Trump under fire – FBI Investigation Pt 2

In Business, Government, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , ,

Since taking office in January, U.S. President Trump has not been able to shake off one particular controversial issue – allegations that his presidential campaign had ties to Russia. Meanwhile the Trump Administration is pushing back saying there was no collusion or secret cooperation. Here’s the White House Press Secretary. To discuss what’s at stake with these new revelations and how the Trump administration is moving forward: Michael Daugherty, a cyber security expert and Donald Trump supporter. He’s also the author of “The Devil Inside the Beltway.” Alexander Nekrassov, a former Kremlin advisor and political analyst. Liling Tan, correspondent for CGTN and covers the United Nations. Alberto Avendano, the Washington Bureau Chief and White House correspondent at the National Association …

View Post

The Heat: Trump under fire – FBI Investigation Pt 1

In Business, Government, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , ,

Since taking office in January, U.S. President Trump has not been able to shake off one particular controversial issue – allegations that his presidential campaign had ties to Russia. Meanwhile the Trump Administration is pushing back saying there was no collusion or secret cooperation. Here’s the White House Press Secretary. To discuss what’s at stake with these new revelations and how the Trump administration is moving forward: Michael Daugherty, a cyber security expert and Donald Trump supporter. He’s also the author of “The Devil Inside the Beltway.” Alexander Nekrassov, a former Kremlin advisor and political analyst. Liling Tan, correspondent for CGTN and covers the United Nations. Alberto Avendano, the Washington Bureau Chief and White House correspondent at the National Association …

View Post

A Lithuanian phisher tricked two big US tech companies into wiring him $100 million

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

A Lithuanian phisher tricked two big US tech companies into wiring him $100 million – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14778655″,”Entry Groups”:”front-page:policy:us-world:tech:cyber-security”,”Author”:”Nick Statt”,”Last Time Updated”:”2017-03-21 19:12″,”Hour of Update”:”19″,”Publish Date”:”2017-03-21 19:12″,”Hour of Publish”:”19″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:policy:us-world:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Nick Statt”,”Logged in Status”:”Logged Out”,”Day of Week”:”tuesday”,”Hour of Day”:”19″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); …

View Post

A Cybersecurity Arsenal That’ll Help ‘Protect Your Election’

In Business, Education, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , ,

The rise of cheap digital attacks like phishing and DDoS doesn’t just endanger businesses. It also endangers democratic elections around the world, in which a well-timed data breach or site outage can meaningfully impact—and potentially destabilize—the democratic process. That’s why Jigsaw and Google, both divisions of Alphabet, are launching a suite of cybersecurity tools today called “Protect Your Election.” They hope to provide a set of free cyber-defenses that can support the independent news outlets, election monitoring and audit groups, activists, and human rights organizations that help elections run smoothly. The innovation here isn’t the tools themselves, but packaging them in a way that makes them accessible to the people who need them most. “There’s a spike in the most …

View Post

iCloud may have doxxed a journalist’s Twitter attacker

In Business, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

iCloud may have doxxed a journalist’s Twitter attacker – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14751915″,”Entry Groups”:”front-page:apple:tech:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-20 17:41″,”Hour of Update”:”17″,”Publish Date”:”2017-03-20 17:41″,”Hour of Publish”:”17″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:apple:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”monday”,”Hour of Day”:”17″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); document.cookie = “umbel_api_key=lrjhazrpqbgtnrij; …

View Post

CVE-2012-5361

In Government, Legal, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 1:36:49 PM CVE Publication rate: 32.87 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 12.82 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

Obama used NSA & FBI to spy on Trump – veteran CIA officer

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , ,

The mighty CIA has fallen victim to a major breach, with WikiLeaks revealing the true scope of the Agency’s ability for cyber-espionage. Its tools seem to be aimed at ordinary citizens – your phone, your car, your TV, even your fridge can become an instrument of surveillance in the hands of the CIA. How does the CIA use these tools, and why do they need them in the first place? And as WikiLeaks promises even more revelations, how is all of this going to shape the already tense relationship between new president and the intelligence community? A man who has spent over two decades in the CIA’s clandestine service – Gary Berntsen is on SophieCo. Follow @SophieCo_RT FULL TRANSCRIPT: https://www.rt.com/shows/sophieco/381… …

View Post

CVE-2014-8701

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8702

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8703

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8704

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8705

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8706

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8707

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8708

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8722

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8723

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9852

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9853

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9854

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9938

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-3881

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-3882

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-3883

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-3884

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-4645

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-7313

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8896 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8897 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8898 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/20/2017 12:58:01 AM CVE Publication rate: 31.17 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 11.77 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

German cybersecurity watchdog raises attack alert level

In Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , ,

(Reuters) – Germany has raised its alert level against cyber attacks to “heightened readiness” ahead of parliamentary elections, saying government websites are already subjected to daily assault, newspaper Welt am Sonntag said. “We are noticing attacks against government networks on a daily basis,” Arne Schoenbohm, president of Germany’s Federal Office for Information Security (BSI), told the paper. BSI is in close contact with election officials, political parties and German Federal States to discuss how to guard against cyberattacks and stands ready to react to potential attacks ahead of the elections, Schoenbohm said. The newspaper did not give details of the number and types of alert levels but said the level has been raised since cyberattacks interfered in U.S. Presidential elections. …

View Post

CVE-2013-4659 (rt-ac66u_firmware, tew-812dru_firmware)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2013-7460

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2013-7461 (application_control, change_control)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2013-7462

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-3926 (lg)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-8688 (messenger)

In Business, Government, Mobile Technology, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9645 (busybox)

In Business, Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9920

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2014-9921

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-4407 (ds-76xxx_series_firmware, ds-77xxx_series_firmware)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-4408 (ds-76xxx_series_firmware, ds-77xxx_series_firmware)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-4409 (ds-76xxx_series_firmware, ds-77xxx_series_firmware)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-6671 (edx-platform)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8894

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8895

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8896

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8897

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8898

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8981

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8982

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8986

In Government, Science & Nature, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8987

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8988

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8989

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 1:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8990

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 12:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8991

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 12:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8992

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 12:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2015-8993

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 12:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2016-0770

In Business, Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 12:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

CVE-2016-10155 (qemu)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/17/2017 12:24:35 AM CVE Publication rate: 34.6 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.26 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post

Paul Ryan says the Obama administration didn’t wiretap Trump Tower

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

Paul Ryan says the Obama administration didn’t wiretap Trump Tower – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14713677″,”Entry Groups”:”front-page:us-world:tech:politics:cyber-security”,”Author”:”Nick Statt”,”Last Time Updated”:”2017-03-16 14:24″,”Hour of Update”:”14″,”Publish Date”:”2017-03-16 14:24″,”Hour of Publish”:”14″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:us-world:tech:politics:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Nick Statt”,”Logged in Status”:”Logged Out”,”Day of Week”:”thursday”,”Hour of Day”:”14″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); document.cookie …

View Post

At SXSW, Tech Reckons With the Problems It Helped Create

In Business, Government, Healthcare, Legal, Mobile Technology, Security, Start Up by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Hangovers are a fixture of South by Southwest. Free branded booze abounds, turning late nights into too-early mornings filled with product demos and repetitive panels. But determined marketers and wide-eyed founders pitch on through the pain, in the unbridled belief they might just be SXSW’s next breakout star. Or at the very least, its next Meerkat. But this year, the conference itself feels a lot like a hangover. It’s as if the coastal elites who attend each year finally woke up with a serious case of the Sunday scaries, realizing that the many apps, platforms, and doodads SXSW has launched and glorified over the years haven’t really made the world a better place. In fact, they’ve often come with wildly …

View Post

Private companies confident, but reportedly unprepared for cyberattacks

In Business, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords:

(Reuters) – The chief executives of some of the worlds’ leading private companies are confident about their firms’ prospects and plan to recruit more staff, but are ill-prepared for cyberattacks, according to a report by PwC on Thursday. The “Undaunted, but underprepared?” report found 86 percent of CEOs were confident about their companies revenue prospects in 2017, an increase of 5 percent from last year. That made it the first time in five years that private company bosses were more confident than public company CEOs. The report, based on responses from 781 private company CEOs in 79 countries, also found that 41 percent of private company CEOs were not concerned about cyber threats and only 68 percent were concerned about …

View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1anchorperson0.655
2person0.706
3web site0.633device, machine, computer, web site
4computer0.633
5machine0.633
6device0.634
7claret red color0.964
8maroon color0.754
Number of Faces Detected: 3
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
124180.613922MALE0.622459
244350.389511FEMALE0
334250.379541MALE0.970688

Two Russian spies among the four charged with hacking Yahoo

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , ,

Federal authorities have charged four men, two of whom are Russian intelligence agents, in the massive Yahoo hack that compromised hundreds of millions of accounts. This marks the first time the U.S. government has issued criminal charges against Russian officials for cyber attacks. Jeff Pegues joins CBSN with the latest. Subscribe to the “CBSN” Channel HERE: http://bit.ly/1Re2MgSWatch “CBSN” live HERE: http://cbsn.ws/1PlLpZ7Follow “CBSN” on Instagram HERE: http://bit.ly/1PO0dkxLike “CBSN” on Facebook HERE: http://on.fb.me/1o3Deb4Follow “CBSN” on Twitter HERE: http://bit.ly/1V4qhIu Get the latest news and best in original reporting from CBS News delivered to your inbox. Subscribe to newsletters HERE: http://cbsn.ws/1RqHw7T Get your news on the go! Download CBS News mobile apps HERE: http://cbsn.ws/1Xb1WC8 Get new episodes of shows you love across devices the …

View Post

News Wrap: Russian officials, hackers charged in Yahoo case

In Business, Finance, Government, Security, Video by PBS NewsHourLeave a Comment

Tech News Keywords: , , ,

In our news wrap Wednesday, two Russian intelligence officers and two cyber hackers have been charged in a Yahoo data breach that compromised 500 million accounts. Also, the Federal Reserve announced that short-term interest rates are going up again, for the second time in three months. Chair Janet Yellen promised more rate increases to come this year.

View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1official0.805person, official
2person0.832
3ultramarine color0.723
4steel blue color0.617

Vint Cerf: Musings on birthing the internet, AI, and wishing for the Star Trek computer

In Business, Education, Emerging Technology, Government, Legal, Mobile Technology, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

More than 44 years ago, the internet was created, and certainly there’s no shortage of events that have occurred to transform one of the world’s most important technological breakthroughs. From websites to emails, banner ads, social media, connected devices, artificial intelligence, smartphones, cloud computing, on-demand services, cyber attacks, and bots, the internet has been incredibly mutated into what renowned technologist Vint Cerf calls “a reflection of the society we live in.” For the father of the internet, a title which he shares with Bob Khan, Cerf isn’t surprised by the evolution of his creation, but believes too few worldwide suffer without proper access to it. And as Google — where Cerf currently works as chief internet evangelist — Facebook, and …

View Post

How Not to Freak Out About Cyber War

In Business, Education, Events, Government, Legal, Science & Nature, Security by New YorkerLeave a Comment

Tech News Keywords: , , , , , , , , ,

When the risks of cyber attacks and surveillance are politicized and exploited, it’s easy to overlook genuine hazards. CreditPHOTOGRAPH BY DANIEL ACKER / BLOOMBERG / GETTY In 2007, Admiral Mike McConnell, the wonky former head of the National Security Agency, became the director of National Intelligence, and soon discovered that many senior American officials were not remotely prepared for the advent of digital warfare. (Less than a year earlier, Senator Ted Stevens, of Alaska, who chaired the main Senate committee that regulates the Internet, had described the Web as a “series of tubes.”) To grab his peers’ attention, McConnell adopted the intelligence community’s version of a party trick: when visiting a Cabinet officer, he would pull out a copy of …

View Post

Russian Spies Helped Hack Yahoo, As If Tensions Weren’t High Enough

In Business, Education, Government, Legal, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

On Wednesday, the Department of Justice indicted two Russian hackers, as well as two Russian spies, in the 2014 Yahoo data breach that compromised 500 million user accounts. (Not to be confused with the breach of 1 billion Yahoo accounts in 2013.) The charges are hacking, economic espionage, trade secret theft, wire fraud, and identity theft. It’s also the first time the US has brought criminal cyber-charges against active Russian officials. The two spies, Igor Sushchin and Dmitry Dokuchaev, are members of the Russian intelligence agency FSB, and work for its cyber investigation division. They allegedly worked with two non-government hackers, Alexsey Belan and Karim Baratov, who has Canadian citizenship and was arrested there on Tuesday. Belan, who has been …

View Post

Career Opportunity: Assistant professor, Security systems and law enforcement technology, Farmingdale State College

In Education, Government, Legal, Science & Nature, Security by IEEE Long IslandLeave a Comment

Tech News Keywords: , ,

FARMINGDALE STATE COLLEGE SECURITY SYSTEMS AND LAW ENFORCEMENT TECHNOLOGY ASSISTANT PROFESSOR  JOB DESCRIPTION: The Department of Security Systems and Law Enforcement Technology at Farmingdale State College (SUNY) invites applications for a tenure-track position at the rank of Assistant Professor beginning in the Fall of 2017. The successful candidate will teach a variety of undergraduate courses in Computer Security, Security Systems and Law Enforcement Technology, including computer security, cryptography, cyber security, computer forensics, physical security, and database operations. Other responsibilities include student advisement and curriculum development. Candidates must engage in grant development work and research leading to publications in refereed academic journals. All faculty members at Farmingdale State College have three workload components: teaching, research and scholarly activity, and service. Service …

View Post

Russian officials hired criminals to hack 500 million Yahoo accounts, according to feds

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Russian officials hired criminals to hack 500 million Yahoo accounts, according to feds – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14698695″,”Entry Groups”:”front-page:tech:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-15 12:01″,”Hour of Update”:”12″,”Publish Date”:”2017-03-15 11:51″,”Hour of Publish”:”11″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”wednesday”,”Hour of Day”:”12″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() …

View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1flash memory0.73memory device, flash memory
2memory device0.836
3device0.837
4purple color0.662

WhatsApp and Telegram accounts could be hijacked by sending malware-laced images

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

WhatsApp and Telegram accounts could be hijacked by sending malware-laced images – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14697089″,”Entry Groups”:”front-page:apps:tech:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-15 09:00″,”Hour of Update”:”09″,”Publish Date”:”2017-03-15 09:00″,”Hour of Publish”:”09″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:apps:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”wednesday”,”Hour of Day”:”09″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); …

View Post

The Unlikely Liberal Hero Adam Schiff Is Ready to Investigate Trump

In Business, Events, Government, Legal, Security by New YorkerLeave a Comment

Tech News Keywords: , , , , , , , , ,

Appalled by President Trump’s muted response to the Russian cyber attack, Adam Schiff has emerged as an unexpected face of Democratic resistance to the new Administration. CreditPHOTOGRAPH BY BILL CLARK / CQ ROLL CALL / GETTY On Monday, March 20th, the House intelligence committee will hold its first open hearing on Russia’s meddling in the 2016 Presidential campaign. Because Republican leaders in the House and Senate have blocked any attempt at forming an independent committee modelled on the bipartisan 9/11 Commission to dig into the Russian cyber attack, the intelligence committee’s investigation may be the only chance Americans have at receiving a comprehensive report on the breadth of the Russian hacking. The top Democrat on the committee is Adam Schiff, …

View Post

Cloud Expo Europe 2017: Tune into the livestream for exclusive show footage

In Business, Events, Security by The StackLeave a Comment

Tech News Keywords: , , , , ,

Cloud Expo Europe kicks off tomorrow at London’s ExCeL Centre, alongside co-located events Data Centre World, Cloud Security Expo, Big Data World and Smart IoT. Expecting to welcome over 20,000 business leaders from around the globe, the technology stack will offer a world-class conference programme packed with expert panel discussions, case studies and roundtables. You can still register for your free pass here, or join us online at Cloud Expo TV to keep up with the latest announcements and exclusive speaker interviews throughout the event. You can also visit the Cloud Expo TV studio at Stand 390 to join the discussion and share your opinion. For those attending over the next two days, don’t miss these key speakers: Paul Bolt, …

View Post

Why is it so hard to trace an anonymous bomb threat?

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: ,

Why is it so hard to trace an anonymous bomb threat? – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14677159″,”Entry Groups”:”front-page:report:tech:cyber-security”,”Author”:”Russell Brandom”,”Last Time Updated”:”2017-03-14 08:59″,”Hour of Update”:”08″,”Publish Date”:”2017-03-14 08:53″,”Hour of Publish”:”08″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:report:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Russell Brandom”,”Logged in Status”:”Logged Out”,”Day of Week”:”tuesday”,”Hour of Day”:”09″}]; window._umbel = window._umbel || []; (function() { var d = new Date(); d.setDate(d.getDate() + 365); …

View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1disco0.889room, disco
2room0.889
3nightclub0.604

Reflecting on RSA Conference 2017

In Business, Education, Events, Government, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: ,

Presented by RSA Hard to believe, but RSA Conference 2017 was just a few weeks ago. We on the conference team are just now catching our breath, reflecting on all the great conversations onsite and already planning for future RSAC events. Since its inception in 1991, RSA Conference has been established as an industry gathering of the brightest minds in security; diverse in experience, neutral in presentation, and built upon the idea of a free-flowing discourse to better serve information security as a whole. 2017 was no different. A record number of more than 43,000 attendees experienced keynotes, peer-to-peer sessions, track sessions, tutorials, and seminars. RSA Conference 2017 featured 15 keynote presentations, more than 700 speakers across 500+ sessions and …

View Post

Yahoo hires IAC exec Thomas McInerney to lead Altaba

In Business, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , ,

As Yahoo prepares to join Verizon, it has revealed an update pertaining to its Altaba spin-off that will oversee the company’s holdings in Yahoo Japan and Alibaba. When the acquisition deal closes later this year, Altaba will be run by Thomas McInerney, the former chief financial officer at IAC, which may shed more light around Marissa Mayer’s future with the company. Joining McInerney are current Yahoo’ers: Alexi Wellman, who will be global controller, and DeAnn Fairfield Work, who is joining as chief compliance officer. Altaba was created in January to be an investment company. While Verizon purchased Yahoo, it was only for the core assets, which left other financial properties left out, so when figuring out what to do with it, Altaba was …

View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1Foucault pendulum0.946apparatus, Foucault pendulum
2pendulum0.954
3apparatus0.954
4gray color0.92

Five Questions About the Latest WikiLeaks Release

In Business, Government, Legal, Mobile Technology, Security by New YorkerLeave a Comment

Tech News Keywords: , , , , , , , , ,

Revelations by WikiLeaks raise concerns about the extent to which the C.I.A. can peek in on domestic and foreign targets, and how much private companies have compromised their customers.CreditPHOTOGRAPH BY CHRISTOPHER MORRIS / VII / REDUX On Tuesday morning, WikiLeaks released eight thousand seven hundred and sixty-one files that it said were “from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence,” in Langley, Virginia. The group called the collection “Year Zero,” the first installment of a larger project, Vault 7, which reveals the “hacking capacity” of the C.I.A.—and which is, in turn, part of a larger archive that, it claimed, had “been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with …

View Post

Hacker Lexicon: What Is an Attack Surface?

In Business, Events, Government, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , ,

Amid so many recent high-profile hacks and data breaches, security experts are fond of pointing out that there’s no such thing as perfect security. It’s true! But it also invites the question: Why doesn’t literally everything get hacked all the time? The answer has to do with the relative incentives and the costs of infiltrating a given network. And one of the concepts underlying that calculus is the idea of an “attack surface.” Here’s an example. Imagine if someone asked you to get inside two buildings, one after the other. The first is a hotel, so you just walk through the main entrance, or maybe through the bar, or up from the parking garage, or from the pool in back. …

View Post

CVE-2010-4314

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

NVD – Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/11/2017 6:00:38 AM CVE Publication rate: 33.57 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists Workload Index Vulnerability Workload Index: 13.18 About Us NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security’s National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the …

View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1Treasury0.653person, Treasury
2person0.757
3people0.614person, people
4black color0.868
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
164550.477385MALE0.989013

WikiLeaks offers tech companies exclusive access to CIA hacking tools

In Business, Government, Legal, Mobile Technology, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

/ Go to Source Article (Reuters) – Wikileaks will provide technology companies with exclusive access to CIA hacking tools that it possesses so they can patch software flaws, founder Julian Assange said on Thursday, presenting Silicon Valley with a potential dilemma on how to deal with the anti-secrecy group. If the offer is legitimate, it would place technology companies in the unusual position of relying on Assange, a man believed by some U.S. officials and lawmakers to be an untrustworthy pawn of Russian President Vladimir Putin, to share cyber vulnerabilities stockpiled by a secretive U.S. spy agency. It was not clear how WikiLeaks intended to cooperate with the companies. The group published documents on Tuesday describing secret Central Intelligence Agency …

View Post

Overwatch director Jeff Kaplan confirms Symmetra is autistic

In Government, Security by Venture BeatLeave a Comment

Tech News Keywords:

/ Go to Source Article Blizzard Entertainment is one of the leading companies when it comes to bringing positive representation of different kinds of people into games, and a lot of the time that goes deeper than physical appearance. Overwatch game director Jeff Kaplan has confirmed to some fans that the Indian face-melting cyber-support character Symmetra is on the autism spectrum. In a response message to a letter from a fan named Samuel, Kaplan explained that she is one of the “most beloved” heroes internally at Blizzard, and that the company wanted her to prove the amazing things that people with autism spectrum disorder can accomplish. The publisher separately confirmed to GamesBeat that Kaplan did write the letter and that Symmetra …

View Post

Cyber security expert John Casaretto discusses the recent Wikileaks revelation on the CIA

In Government, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , ,

/ Go to Source Article To take a look at the Wikileaks revelation on the CIA’s hacking capabilities and their impact on the American tech industry, CGTN’s Elaine Reyes spoke to John Casaretto of cybersecurity firm BlackCert.

View Post

'Double standards': CIA leaks don't stir MSM, Russia stays in spotlight

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , , ,

/ Go to Source Article The White House has accused the media of ‘double standards’ after largely ignoring revelations the CIA can frame other countries for hacking. Wikileaks’ latest file dump shows the American intelligence chiefs could have used Russian malware to make it look like Moscow was behind cyber-attacks during the U.S. presidential election. Wikileaks has promised more revelations saying this first file-dump is just 1% of the total. With some saying the information could play into Russia’s hand as RT’s Polly Boiko reports. READ MORE: WikiLeaks will give tech companies exclusive access to CIA hacking tools – Assange https://on.rt.com/857u FBI investigating Wikileaks’ vault 7 disclosures on CIA hacking https://on.rt.com/8558 WikiLeaks says just 1% of #Vault7 covert documents released …

View Post

Marines ask if Cyber Command could help online harassment issues

In Business, Legal, Security by The StackLeave a Comment

Tech News Keywords: , ,

/ Go to Source Article A representative from the Marine Corps has posed the question as to whether U.S. Cyber Command, tasked with the online defence of the United States, could or should become involved in incidents such as the scandal over male marines sharing online nude photos of their female colleagues. Testifying before the House Appropriations Committee, Marine Corps Sgt. Maj. Ronald Green – enlisted adviser to the Marines’ commandant – posited that the service does not currently have adequate legal tools or frameworks to address what is perceived to be a widespread culture of harassment towards female Marines, both on and offline, and suggests that U.S. Cyber Command could at least be considered as a resource for prosecuting …

View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1iPod0.766audio system, stereo system, iPod
2stereo system0.838
3audio system0.838
4device0.669
5indigo color0.93
6coal black color0.622

Google says it’s already fixed many exploits from WikiLeaks’ CIA document dump

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

/ Go to Source Article Google says it’s already fixed many exploits from WikiLeaks’ CIA document dump – The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem(‘chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c’) === ‘yes’) { d.documentElement.className += ‘ fonts-loaded’; } } catch (e) {} var fontUrls = [“https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css”]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = ‘all’; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host=”https://volume.vox-cdn.com”;var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=function(o,n){var t=document.createElement(“script”);t.async=!0,t.type=”text/javascript”,t.src=o,”function”==typeof n&&(t.onload=n);var e=document.getElementsByTagName(“script”)[0];return e.parentNode.insertBefore(t,e),t},Chorus.ready=function(o){“loading”!=document.readyState?o():document.addEventListener?document.addEventListener(“DOMContentLoaded”,o):document.attachEvent(“onreadystatechange”,function(){“loading”!=document.readyState&&o()})},Chorus.OnLoad=function(o){if(Chorus.windowLoaded=!0)return void o();var n=window.onload;”function”!=typeof window.onload?window.onload=o:window.onload=function(){n(),o()}},Chorus.OnLoad(function(){Chorus.windowLoaded=!0}); dataLayer = [{“Network”:”theverge”,”Community”:”theverge”,”GA Primary ID”:”UA-26533115-1″,”GA CrossDomains”:”theverge.com”,”Content ID”:”14630151″,”Entry Groups”:”front-page:google:tech:cyber-security”,”Author”:”Rich McCormick”,”Last Time Updated”:”2017-03-09 00:12″,”Hour of Update”:”00″,”Publish Date”:”2017-03-09 00:12″,”Hour of Publish”:”00″,”Demand Post”:”no”,”All Chorus Categories”:”theverge:theverge:front-page:google:tech:cyber-security”,”Content Type”:”article”,”chartbeat_domain”:”theverge.com”,”chartbeat_zone”:”172968584/verge”,”chartbeat_authors”:”Rich McCormick”,”Logged in Status”:”Logged Out”,”Day of Week”:”thursday”,”Hour of Day”:”00″}]; window._umbel = window._umbel || []; (function() { var d …

View Post

New criminal probe into WikiLeaks classified documents hack

In Government, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , ,

/ Go to Source Article The leaked documents detail a complex range of cyber weapons being developed by the CIA. WikiLeaks said they exploit vulnerabilities in devices like desktop computers, mobile phones, vehicle computers and even some TVs with voice activation features. CGTN’s Daniel Ryntjes reports.