• Apple Adds Guide On Browser Security In Wake Of China Hack

    Apple Adds Guide On Browser Security In Wake Of China Hack

    Apple has released an updated iCloud security support document with instructions on how to avoid man-in-the-middle type attacks like those affecting customers in China reported over the past couple of days. The support site says that Apple is “deeply committed to protecting [its] customers’ privacy and security,” and that it is “aware of intermittent organized… Read More

  • Several U.S. States Now Investigating Ebay Cyberattack

    Several U.S. States Now Investigating Ebay Cyberattack

    Several U.S. states, including Connecticut, Florida, and Illinois, are jointly leading an investigation into eBay’s security practices, following eBay’s reveal this week of a massive cyberattack which the company says compromised a large number of users’ personal information. Though eBay claims that financial data, which was stored separately, was not acquired during… Read More

  • In-Depth Security Analysis of Portable Encrypted Hard Drive

    Jeroen Domburg, aka “sprite”, has written an excellent step-by-step security analysis of the iStorage DiskGenie. The DiskGenie is a hardware encryption solution for portable hard drives that operates completely free of client-side software. The hard drive inside the DiskGenie is unlocked by way of a keypad built into the casing. I’m always a little skeptical of the… Read More

  • Intel admits it was target of "sophisticated" attack

    Google was attacked by hackers in China. Microsoft reports that they’re the target of hackers all day, every day. Now Intel is stepping forward, and admitting in their annual 10-K filing that they were the target of a sophisticated attack. Intel observes that it might be industrial espionage, or it might be “hackers seeking to harm the company.” It makes you wonder how… Read More

  • Unpatched PCs put in compromising situation in under four minutes

    According to researchers at the SANS Internet Storm Center (ISC), an unpatched PC will last in the wilds of the Web less than four minutes before being attacked and compromised. That’s faster than most people can run a mile, and as ISC’s Survival Time sitepoints out, faster than it takes to download most patches. The ISC has an interactive graph showing the rise and recent plummet… Read More