BlackBerry to acquire German firm Secusmart

July 29, 2014 in Security News by News Bot

BlackBerry is buying privately held German firm Secusmart which specialises in voice and data encryption, in a bid to improve its credentials security as part of its strategy to target specific industries and niches.

Secusmart specialises in encryption and anti-eavesdropping services for public sector, enterprise and telecommunications service providers.

Former NSA director will file “at least” 9 patents to detect malicious hackers

July 29, 2014 in Security News by News Bot

In an interview Monday with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications—“and possibly more"—pertaining to technology for detecting network intruders.

New “Fake ID” exploit allows new types of Malware on Android?

July 29, 2014 in Security News by News Bot

A new Android design error discovered by Bluebox Security allows malicious apps to grab extensive control over a user's device without asking for any special permissions at installation. The problem affects virtually all Android phones sold since 2010.

Bluebox calls the flaw "Fake ID" because it allows malware apps to pass fake credentials to Android, which fails to properly verify the app's cryptographic signature. Instead, Android grants the rogue app all of the access permissions of whatever legitimate app the malware claims to be.

Microwave hacked into weapon, used to blow up a stereo

July 29, 2014 in Security News by News Bot

There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them. Still, as with all things, someone somewhere will eventually try it, as was the case with the person(s) behind Kreosan.

Kreosan is the YouTube handle of a young Russian man who, featured in the video below, tore into a microwave's innards and transplanted them onto the end of a stick (in addition to what appears to be a can of soup, which seems to be used as an antenna).


How do hackers breach institutions like Canada’s NRC?

July 29, 2014 in Security News by News Bot!/httpImage/image.jpg_gen/derivatives/landscape_620/image.jpg

Cyberattacks like the one against the National Research Council of Canada are increasing around the world. But by knowing the steps hackers would use for a sophisticated attack, security experts try to gain the upper hand.

"Sometimes in breaches, companies call it a 'highly sophisticated cyberattack' (as the Government of Canada's chief technology officer said in a statement Tuesday) in order to make it seem like they were beaten by the best," Geoffrey Vaughan, a security consultant with Security Compass, told CTV News Channel.

US senator seeks strong curbs on NSA metadata collection

July 29, 2014 in Security News by News Bot

A new Senate proposal to curb the government's bulk collection of Americans' telephone records and increase transparency about the program has White House backing, and may get more traction with critics who have dismissed other bills as too weak.

Democrat senator Patrick Leahy, chairman of the Senate Judiciary Committee, introduced the legislation in the United States upper house yesterday.