Mobile device makers react differently to attack info, researcher says

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Mobile device makers react differently to attack info, researcher says


Mobile device makers react differently to attack info, researcher says

Posted: 19 Jan 2011 08:00 AM PST


When a researcher at an ethical-hacking firm discovered mobile devices from Apple, Google, RIM and HTC had a flaw in them that would allow an attacker using malicious Web code to freeze them up and crash them, he contacted the companies last year.

Keyless systems on cars easily hacked, researchers say

Posted: 19 Jan 2011 08:00 AM PST


The passive keyless entry and start systems supported by many modern cars are susceptible to attacks that allow thieves to relatively easily steal the vehicles, say security researchers.

AT&T iPad hackers' chats were turned in by secret source

Posted: 19 Jan 2011 08:00 AM PST


The government's case against two men charged with hacking into AT&T's website to steal e-mail addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other members of their hacking group.

Gaping security flaw exposed on anti-tamper devices

Posted: 19 Jan 2011 08:00 AM PST


Security devices used in transportation, packaging and even in accounting for nuclear materials are very vulnerable to attack, two security researchers are warned on Tuesday at the Black Hat security conference.

Black Hat puts 'offense' on its cyber agenda

Posted: 18 Jan 2011 08:00 AM PST


The Stuxnet worm and techniques for mounting offensive cyberattacks are among the subjects being debated at this week's Black Hat conference in Arlington, Va.

Microsoft adds to security tools for developers

Posted: 18 Jan 2011 08:00 AM PST


Attack Surface Analyzer security development lifecycle verification tool offered along with consulting services for secure development

0 comments:

Post a Comment