Hackin9
There's a push to adopt chip-equipped payment cards in the U.S. following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.
 
A seemingly constant stream of data breaches and this week's news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn't it time we dumped the user name and password?
 
In rejecting a proposed settlement in Silicon Valley's closely watched "no hire" case, District Judge Lucy Koh said on Friday there's strong evidence that Steve Jobs was a central figure, if not "the" central figure, in the alleged conspiracy to suppress workers' wages.
 
LinuxSecurity.com: New openssl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues. [More Info...]
 
LinuxSecurity.com: Multiple vulnerabilities has been discovered and corrected in wireshark: * The Catapult DCT2000 and IrDA dissectors could underrun a buffer (CVE-2014-5161, CVE-2014-5162). [More...]
 
The U.S. Federal Communications Commission voted Friday to require U.S. mobile carriers and many text-messaging apps to enable users to text emergency dispatch centers, even after questions about whether the centers will be ready by the deadline.
 
A California judge has rejected the proposed settlement in a lawsuit over no-hire agreements among top Silicon Valley companies, saying the amount being offered to compensate workers is too low.
 
DigitalGlobe's WorldView 3 satellite, scheduled to launch next week, promises to bring unprecedented resolution to commercial satellite imagery.
 
Owners of Windows Phone 7 smartphones are apoplectic that Skype no longer works on their devices.
 
Google has found a way to stretch a data warehouse across multiple data centers, using an architecture its engineers developed that could pave the way for much larger, more reliable and more responsive cloud-based analysis systems.
 
Woe be to the software vendor who aggravates the mental status of recent law school grads.
 
When you graduated from high school, you might have thought peer pressure was mostly over.
 
Microsoft is giving customers 17 months to stop using older versions of Internet Explorer, including the most popular of them all, IE8.
 
Most users turn to social media sites for entertainment and information, but for digital marketers social engagements represent a dynamic way to generate leads. Fostering leads, or potential customers, in social media is not as clear-cut or obvious as email, TV or print marketing, but there is enough history and background now to follow and replicate what is already working.
 
Wireshark RLC Dissector CVE-2014-5164 Denial of Service Vulnerability
 
[security bulletin] HPSBMU03062 rev.1 - HP Insight Control server deployment on Linux and Windows running OpenSSL, Multiple Vulnerabilities
 
[ MDVSA-2014:158 ] openssl
 
Wireshark GTP and GSM Management Dissector CVE-2014-5163 Denial of Service Vulnerability
 
Wireshark Catapult IrDA Dissector CVE-2014-5161 Remote Denial of Service Vulnerability
 
Wireshark Catapult DCT2000 Dissector CVE-2014-5162 Remote Denial of Service Vulnerability
 
As the Baby Boomer generation ages, and rural population grows, telemedicine is expected to take off this year as an alternative to traditional in-person physician visits.
 
The U.S. Federal Communications Commission chairman's view of net neutrality rules and President Barack Obama's are not as different as some reports this week have suggested, the chairman said Friday.
 
The PCI Security Standards Council has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data.
 
MIT Kerberos 5 CVE-2014-4341 Remote Denial of Service Vulnerability
 
[ MDVSA-2014:159 ] wireshark
 
ESA-2014-055: EMC Network Configuration Manager (NCM) Report Advisor Session Fixation Vulnerability
 
Scientists have found a way to cheaply and quickly build sophisticated robots that can automate their own design and assembly process.
 
What incoming Sprint CEO Marcelo Claure can do to reverse the carrier's declining subscriber base and turn the company around.
 
CHICKEN 'read-u8vector!' Procedure Remote Buffer Overflow Vulnerability
 
The differences that Tesla represents to the auto market fascinate me. The firm is run more like a cutting-edge Apple than a typical car company such as Jaguar a and, in fact, exceeds Apple in the application of advanced technologies such as analytics. This is largely how Tesla has succeeded where most new car companies, including Fisker, have failed.
 
Bugzilla CVE-2014-1546 Cross Site Request Forgery Vulnerability
 
Ansible CVE-2014-4966 Arbitrary Code Execution Vulnerability
 
Ansible CVE-2014-4967 Arbitrary Code Execution Vulnerability
 
LinuxSecurity.com: Multiple vulnerabilities has been discovered and corrected in openssl: A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. Applications may be affected if they echo pretty [More...]
 
LinuxSecurity.com: Updated ipython package fixes security vulnerability: In IPython before 1.2, the origin of websocket requests was not verified within the IPython notebook server. If an attacker has knowledge of an IPython kernel id they can run arbitrary code on [More...]
 
LinuxSecurity.com: Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Important security [More...]
 
LinuxSecurity.com: Several security issues were fixed in OpenSSL.
 
LinuxSecurity.com: Updated tomcat packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Low security [More...]
 
LinuxSecurity.com: Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security [More...]
 
LinuxSecurity.com: Updated 389-ds-base packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security [More...]
 
LinuxSecurity.com: Updated ocsinventory packages fix security vulnerability: Multiple cross-site scripting (XSS) vulnerabilities in the OCS Reports Web Interface in OCS Inventory NG allow remote attackers to inject arbitrary web script or HTML via unspecified vectors (CVE-2014-4722). [More...]
 
The tables could turn by the end of this year in the drama of the U.S. mobile underdogs, with T-Mobile possibly passing Sprint to become the third-largest carrier in the country.
 
The people at a company called aiia (their Web site loads insanely slowly) out of the Ukraine pitched me the SSSSSpeaker (yes, that's how they spell it, it's not a a typo), billed as the world's smallest Bluetooth speaker, and sent me a unit.
 
A 'class action' suit against Facebook over its privacy policies was rejected by the commercial court of Vienna, and referred to the regional court in the same city, a commercial court spokesman said Friday.
 
D-Link DWL-3200AP Multiple Security Vulnerabilities
 
OpenStack Keystone Trust CVE-2014-3520 Privilage Escalation Vulnerability
 
OpenStack Keystone Trust Chained Delegation Privilage Escalation Vulnerability
 
[WorldCIST'15]: Call for Workshops Proposals - Proceedings by Springer
 
OpenSSL DTLS CVE-2014-3510 Remote Denial of Service Vulnerability
 
[ MDVSA-2014:157 ] ipython
 
[security bulletin] HPSBUX03087 SSRT101413 rev.1 - HP-UX CIFS Server (Samba), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access
 
Beginners error: QuickTime for Windows runs rogue program C:\Program.exe when opening associated files
 
[security bulletin] HPSBMU03086 rev.1 - HP Operations Agent running Glance, Local Elevation of Privilege
 
Mid-sized companies are starting to outperform the leading IT suppliers to government, according to a report by analysts from TechMarketView.
 
The U.S. Patent and Trademark Office has rejected some claims of an Apple patent that was one of the basis for a recent damages award in a dispute with Samsung Electronics.
 
In a noteworthy change of strategy, Microsoft plans to release future feature updates to Windows 8.1 in smaller chunks more frequently.
 
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.
 
Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.
 
Internet Storm Center Infocon Status