Information Security News
by Dan Goodin
Contrary to public claims, Apple employees can read communications sent with its iMessage service, according to researchers who have reverse engineered it.
The finding, delivered Thursday at a Hack in the Box presentation titled How Apple Can Read Your iMessages and How You Can Prevent It, largely echoes the conclusion Ars reached in June. It contrasts sharply with assurances that Apple gave following revelations of an expansive surveillance program by the National Security Agency. iMessage conversations, Apple said at the time, "are protected by end-to-end encryption so no one but the sender and receiver can see or read them." It added: "Apple cannot decrypt that data."
Researchers from QuarksLab who delivered Thursday's talk, begged to differ.
by Beats By Dr Dre
by louis vuitton outlet store
Malware that takes computers hostage until users pay a ransom is getting meaner, and thanks to the growing prevalence of Bitcoin and other digital payment systems, it's easier than ever for online crooks to capitalize on these "ransomware" schemes. If this wasn't already abundantly clear, consider the experience of Nic, an Ars reader who fixes PCs for a living and recently helped a client repair the damage inflicted by a particularly nasty title known as CryptoLocker.
It started when an end user in the client's accounting department received an e-mail purporting to come from Intuit. Yes, the attached archived zip file with an executable inside should have been a dead giveaway that this message was malicious and was in no way affiliated with Intuit. But accounting employees are used to receiving e-mails from financial companies. When the receiver clicked on it, he saw a white box flash briefly on his screen but didn't notice anything else out of the ordinary. He then locked his computer and attended several meetings.
Within a few hours, the company's IT department received word of a corrupt file stored on a network drive that was available to multiple employees, including the one who received the malicious e-mail. A quick investigation soon uncovered other corrupted files, most or all of which had been accessed by the accounting employee. By the time CryptoLocker had run its course, hundreds of gigabytes worth of company data was no longer available.
by pandora charms
by pandora charms
by louis vuitton outlet online
Posted by InfoSec News on Oct 17Forwarded from: security curmudgeon <jericho (at) attrition.org>
Posted by InfoSec News on Oct 17http://www.wired.com/threatlevel/2013/10/ics/
Posted by InfoSec News on Oct 17http://news.techworld.com/security/3474018/hackers-planted-remote-devices-smuggle-drugs-through-antwerp-port-europol-reveals/
Posted by InfoSec News on Oct 17http://english.yonhapnews.co.kr/northkorea/2013/10/15/0401000000AEN20131015003200315.html
Posted by InfoSec News on Oct 17http://www.redorbit.com/news/technology/1112976684/dexter-malware-strikes-south-africa-banks-101613/
Posted by InfoSec News on Oct 17http://krebsonsecurity.com/2013/10/breach-at-pr-newswire-tied-to-adobe-hack/