Business, Cloud Computing, Enterprise, Software Programs, Technology Security

Yahoo Hacked via Shellshock Vulnerability

Yahoo Logo

The Shellshock bug, also known as the bash bug appears to already be taking some major tech companies as its first victims.

Read More...

Cloud Computing, Hardware, Rumors, Software Programs, Technology Security

Security Researcher Claims iOS Devices Have a Backdoor

Apple Logo iMessage iWatch Backdoor

A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What’s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by posting a support page about it. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple’s services) so they’re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly

Read More...

Software Programs, Technology Security

The Whitehouse Says They Have Right to Withhold a Security Vulnerability

Whitehouse Logo

On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted a blog clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the Heartbleed bug officially on Twitter, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question. So, what exactly are they going to disclose and when? Well, there’s a nifty little check list that the Whitehouse has provided us with so that

Read More...

Software Programs, Technology Security, VR World

Time to Run and Hide from Internet Explorer, For Now

Internet Explorer

Internet Explorer has had a pretty bad reputation over the years as a pretty awful browser, and from the IE6 through the IE9 days, that was a pretty accurate statement. However, nowadays Internet Explorer is fairly good and the only browser on Windows worth anything for touch. The guys and gals over at FireEye managed to discover this Zero Day Exploit and dubbed the entire operation, “Operation Clandestine Fox.” They claim that this zero day exploit targets IE9 through IE11 browsers, which make up about 26% of all browser users around the world which is pretty significant. Microsoft has also put out a security bulletin on

Read More...