Google Announces 2014 Pwnium Hacking Contest

Hack Chrome OS and get paid for it. The upcoming annual Google Pwnium event is offering you this golden opportunity. Over $2.7 million will be distributed as prize money in the fourth edition of prestigious hacking competition, to be held on March 12 at the CanSecWest security conference in Vancouver, Canada. 

Read More ›

Justin Bieber Malware Spreading Across The Web

We all have different opinions on the Justin Bieber phenomenon, but there is no denying his star-power and influence over the younger generation. The Canadian star is constantly in the headlines for the wrong reasons, including a DUI arrest last week. Interestingly, this event has deeply affected information security worldwide.

Read More ›

NSA Uses Angry Birds, Google Maps, & Other ‘Leaky’ Apps To Spy

We’re already well-informed of just how far-reaching the NSA’s data-tapping techniques are, but newly published leaks have taught us more methods to the NSA-madness. According to new documents furnished by Edward Snowden, the NSA and British-counterpart GCHQ have been tapping into commercial data troves collected by popular smartphone apps like Angry Birds and Google Maps

Read More ›

Botnet Alert: Your Refrigerator May Be Infected

The “smart” home appliances we all are letting into our lives are getting “smarter”. This isn’t a movie plot, nor is it a scientific experiment. Security provider Proofpoint estimates that over 750,000 phishing and spam emails have already been sent out by infected fridges, televisions and other appliances.

Read More ›

Crafty Hackers & Other AppSec Stories This Week

Breaches seem to be hitting every country across every industry these days. This week was no better. Not only did the biggest craft store in the U.S. disclose a breach affecting an unknown number of credit card users, but nearly 40% of South Koreans as well as 16 million Germans are dealing with the affects

Read More ›

Google Turns Deaf Ear to Speech Recognition Exploit in Chrome

Each new technology seems to emerge together with exploitable baggage. Speech recognition, for example, is being used in rising technologies from Siri to smart homes and is evolving quickly. While speech recognition has the potential to make life much easier and quicker, like any technology it comes with flaws. In this case, a Chrome browser exploit

Read More ›

Preparing the Cyber-Cops of Tomorrow: Interview with Giovanni Vigna

Each year, hundreds of hackers gather in computer labs around the world. Their goal? Like any other hackers, their goal is to manually exploit application and network level flaws in servers across the globe. If it sounds malicious, it’s just because it mimics real world vulnerability exploitations that happen every day. In fact, this specific

Read More ›

Starbucks iOS App Vulnerability Exposed

App security has become a sensitive topic as more and more private information is being shared by users. Even minor vulnerabilities can be exploited and used to harvest sensitive data for criminal or commercial purposes. The latest high-profile loophole was exposed in the Starbucks iOS app.  The vulnerability was found by Daniel E. Wood, a

Read More ›

ATMs Robbed With Malicious USB Drives

Lovers of the “Terminator” movie series surely remember how John Connor used his cool “binary code gadget” to hack into his local ATM machine. Technology has changed a lot since the early nineties, but hackers are still milking ATMs using malware-loaded USB drives. It’s estimated that millions of dollars have already been stolen in Europe

Read More ›