Are you getting sick of SSL/TLS and other cryptography related vulnerabilities? I sure am! Nonetheless, we need to keep on top of them in order to keep our communications private. In today's daily video I cover Logjam, a new named vulnerability having to do with the Diffie-Hellman key negotiation. Watch the video to learn which of your systems might be affected, and more … [Read more...]
Facebook Hacked- WSWiR Episode 74
App Store Hole, LoL Breach, and Zuckerberg Hacked I'm back with our regular infosec news video summary, where I highlight the biggest or most interesting security stories from the week and share a few tips along the way. Today's episode covers a handful of software updates, the breach of a popular multiplayer arena battle game, some drama around a new Facebook vulnerability, … [Read more...]
Android Bitcoin Wallets Broken – WSWiR in Words
Hacked Baby Monitors, Broken Bitcoins, and Apache Exploit Kits By the time you see this on Friday, I'll be hiking and camping in the Olympic National Forest. I'm taking a day off this week for an extended camping weekend. Unfortunately, that also means I did not have time to produce a full InfoSec summary video... but fear not. In lieu of this week's video, I'm leaving you … [Read more...]
TorSploit – WSWiR Episode 73
BREACH, TorSploit, and Fort Disco Sorry for the late posting, but your weekly taste of "what's up" in the InfoSec world is here for your viewing pleasure. As always, I summarize some of this week's biggest network and information security news, in case you didn't have time to follow it yourself. This week was packed with security stories, but I only had time to focus on four. … [Read more...]
Five July Windows Bulletins: MSXML Fix Included
Severity: High Summary: These vulnerabilities affect: All current versions of Windows, as well as optional components like MSXML and MDAC. How an attacker exploits them: Multiple vectors of attack, including enticing your users to web sites with malicious content or getting them to run malicious executables Impact: In the worst case, an attacker can gain complete control … [Read more...]