GCHQ admits to hacking in court, says hacking helps stop terror attacks Roi Perez, SC MagazineGCHQ has admitted for the first time that it has hacked computers, smartphones, and networks in the UK and abroad using CNE. ...Jumat, 29 Jan 2016
Data on All Dutch Mobile Customers Is One Photo Away, Experiment ShowsCatalin Cimpanu, SoftpediaSecurity researcher Sijmen Ruwhof has published details about the many insecure policies used by Media Markt, a Dutch electronics store, and Dutch telecom operators.Jumat, 29 Jan 2016
B.C. government IT systems vulnerable: AGThe Canadian Press, CBC NewsMany British Columbia government organizations lack a strong enough line of defence against hacking, system threats and disruption, according to the province's auditor general.Jumat, 29 Jan 2016
Aer Lingus, easyJet and Chiltern Railways accused of exposing credit card dataJason Murdock, V3Flaws in the mobile websites of major firms operating in the UK including easyJet, Aer Lingus and Chiltern Railways have resulted in sensitive user data being transmitted without encryption, according to mobile security firm Wandera. Jumat, 29 Jan 2016
29 locations affected in Elephant Bar POS breachRobert Abel, SC MagazineCM Ebar, LLC, the owner of Elephant Bar restaurants, announced a point-of-sale (POS) breach may have affected the information of customers at 29 locations in California, Colorado, Arizona, Missouri, Nevada, New Mexico, and Florida.Jumat, 29 Jan 2016
Upon reflection, BitTorrent amplifies DDoS attacksDavey Winder, SC MagazineNew DRDos attack using BitTorrent investigated: able to amplify traffic up to a factor of 50 times on average, and 120 times in the case of BTSync. ...Kamis, 10 Sep 2015
Team finds 11 security flaws in popular internet browsers using new analysis methodvia Phys.orgResearchers from the Georgia Institute of Technology College of Computing developed a new cyber security analysis method that discovered 11 previously unknown Internet browser security flaws. .....Kamis, 10 Sep 2015
OwnStar Attack Now Aimed at BMW, Chrysler, Mercedes CarsDennis Fisher, TreatPost (Kaspersky Blog)Shortly after Kamkar disclosed the attack, which took advantage of a flaw in the RemoteLink app, GM issued a fix. .....Kamis, 10 Sep 2015
Linux Machines Produce Easy to Guess Random NumbersCatalin Cimpanu, SoftpediaA study carried out by two security researchers revealed that the internal system used by Linux systems to produce random numbers, which are later utilized to encrypt data, is much weaker than previously thought. ....Kamis, 10 Sep 2015
BitTorrent family susceptible to DRDoS attacksKarl Thomas, Welivesecurity (ESET Blog)Widely used BitTorrent applications have been found to be vulnerable to distributed reflective denial-of-service (DRDoS) attacks, according to new research. .....Kamis, 10 Sep 2015
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: