In-brief: There were a thousand reasons not to click on that Google Docs link…but thousands of people did anyway. Why?
Search Results for "bug bounty"
Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog
In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”
The Good, Bad and Ugly of Vulnerability Markets
In-brief: Markets for information on software vulnerabilities are good for security. But they can also raise moral and ethical quandaries, especially in an age of cyber physical risks, argues Cisco’s Marc Blackmer.
You’re Powerless to stop Vehicle Hacking, but read this FBI Advisory anyway
In-brief: eight months after security researchers demonstrated a remote software-based attack against a Fiat-Chrysler Jeep Cherokee, the FBI has issued an advisory addressing software based risks to vehicles. But the Bureau has few fixes for the problem.
iPhone TouchID Falls To Well-Known Hack
Apple’s Touch ID may be the new thing when it comes to signing on to your iPhone. But the underlying finger print scanning technology proved vulnerable to a very old-school attack, according to information posted by the German hacking crew The Chaos Computer Club (CCC). The group announced late Saturday that it was able to successfully bypass TouchID with a fake fingerprint, lifted from a glass surface. “This demonstrates – again – that fingerprint biometrics is unsuitable as access control method (sp) and should be avoided,” the group wrote in blog post announcing the compromise. Apple’s Touch ID biometric sign-on was the major new feature in the just-released iPhone 5S (the feature is not offered for the lower-cost 5C, which was also just announced.) The feature makes use of technology Apple acquired in July 2012 with the firm AuthenTec, and its addition to the iPhone line was no surprise. But […]