Mozilla Network Security Services CVE-2015-7575 Security Bypass Vulnerability
Monthly Archives: July 2016
Vuln: OpenSSL CVE-2016-0799 Remote Format String Vulnerability
OpenSSL CVE-2016-0799 Remote Format String Vulnerability
Vuln: OpenSSL CVE-2016-0705 Denial of Service Vulnerability
OpenSSL CVE-2016-0705 Denial of Service Vulnerability
White House Beefs Up Cyber Threat Response Action Plan
A new White House directive outlines the U.S. cyber threat response strategy along with issuing a color-coded cyber threat schema.
LastPass Bug Lets Hackers Steal All Your Passwords
A critical zero-day flaw has been discovered in the popular cloud password manager LastPass that could allow any remote attacker to compromise your account completely.
LastPass is a password manager that also available as a browser extension that automatically fills credentials for you.
All you need is to remember one master password to unlock all other passwords of your different online
![]()
End of SMS-based 2-Factor Authentication; Yes, It's Insecure!
SMS-based Two-Factor Authentication (2FA) has been declared insecure and soon it might be a thing of the past.
Two-Factor Authentication or 2FA adds an extra step of entering a random passcode sent to you via an SMS or call when you log in to your account as an added layer of protection.
For example, if you have 2FA enabled on Gmail, the platform will send a six-digit passcode to your mobile
![]()
NIST Recommends SMS Two-Factor Authentication Deprecation
The U.S. National Institute for Standards and Technology (NIST) said SMS-based two factor authentication would soon be deprecated.
Cyberattacks affect ‘nearly every single company’
Around eight in every 10 cybersecurity executives admit their company has been compromised by a cyberattack in the past 24 months.
The post Cyberattacks affect ‘nearly every single company’ appeared first on We Live Security.
![]()
Attributing Advanced Attacks Remains Challenge For Researchers
Kaspersky Lab researchers participated in a Reddit AMA, touching on topics such as attack attribution, critical infrastructure security, attacker and researcher tradecraft, and the shortage of security talent.
