ÃÛÌÒTV

News 07-31-2015

This Month in SSL: July 2015

Mark Santamaria

Here is our latest news roundup of articles about network and SSL security. to see the whole series.

SSL & Encryption News

  • Early in July the they would be releasing a patch for a high severity vulnerability that allowed an attacker to .
  • Researchers found that a known attack technique used against could also be used to break into WiFi networks.
  • Both Google Chrome and Mozilla Firefox released updated versions of their browsers, fixing a number of vulnerabilities. Google released , and Mozilla released .

Data Breaches

  • in early July. More than 400 GB of information was stolen.
  • , the ID theft protection firm, did not protect their network sufficiently, resulting in a data breach.
  • forum was hacked in mid-July. It is unknown what information was stolen, but users’ login credentials, emails addresses, and DOB were likely affected.
  • announced that 10 of its properties were affected by a recent data breach.
  • A year ago JPMorgan Chase discovered a hack that compromised 83 million accounts. This year U.S. law enforcement arrested .

Internet of Things

  • . Security researchers Charlie Miller and Chris Valasek .
  • A recently discovered vulnerability could be more deadly than others affecting IoT. Two researchers discovered a vulnerability in a .
  • Researchers found vulnerabilities in three of the most popular .

Cybercrime

  • Scammers use, slipping past Google filters.
  • Cybercriminals exploit a that has been around for over 25 years.

Malware

  • could infect Android phones, even if users don’t open the text. .
  • Andromeda botnet infects new point-of-sale systems with new malware called .
  • Cowboy Adventure and Jump Chess, legitimate games on Google Play, contained functions to .
  • A recently discovered allows hackers the ability to submit thousands of password guesses in very little time.

Research & Studies

  • An Acunetix report discovered that .
  • A recent study which analyzed a quarter million endpoint devices detected.
UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-27-2024

6 actionable ways to secure the IIoT at every stage

Tracking the progress toward post-quantum cryptography

The state of PQC since the publication of FIPS 203, 204 and 205