Skip to content
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Opsec

Caution: Misuse of security tools can turn against you

11 July 2019

We have a saying in Greece: “They assigned the wolf to watch over the sheep.” In a security context, this is a word of caution about …

Tags Automation, Carbon Black, Data Leaks, Infosec, Opsec

Some Signal Disappearing Messages Are Not Disappearing

8 June 2018

On Thursday, the New York Times reported that government prosecutors had seized years’ worth of a national security reporter’s phone …

Tags Bugs, Cyber Threats, Encryption, Hacking, Information Security, Infosec, Malware, Messages, Opsec

The NSA Just Released 136 Historical Propaganda Posters

4 June 2018

The National Security Agency isn’t just concerned with spying on the bad guys—and sometimes the good guys—or creating powerful …

Tags Edward Snowden, FOIA, Leaks, NSA, Opsec, Posters, Propaganda, Surveillance

New Tool Automatically Finds and Hacks Vulnerable Internet-Connected Devices

31 January 2018

Hacking isn’t always hard. Some lower-tier hackers use programs to automatically churn through breached login details to break into other …

Tags Cyber Threats, Devices, Hacking, Hacks, New, Opsec, Tools, Vulnerable

Strava user heatmap reveals patterns of life in western military bases

29 January 2018

In November 2017, online fitness tracker Strava published a heatmap of the activity many of its users around the world engage in (and …

Tags Apps, Fitness Trackers, Mobile, Opsec, Privacy

This Custom-Made Jihadi Encryption App Hides Messages in Images

26 January 2018

Jihadis and their supporters have long made use of encryption to communicate securely, and in some cases even make their own, branded …

Tags Apps, Encrypted Messaging, Encryption, Images, Isis, Malware, Messages, Mobile, Opsec

An Anonymous YouTube Video Has Started a Battle in the Secretive Secure Phone Industry

24 January 2018

“Inside information has been leaked!” the caption beneath an anonymous video, uploaded last month to YouTube, reads. In the clip, …

Tags Anonymous, Battle, Cyber Threats, Hacking, Hacks, Industry, Opsec, Phones, Secure

Snowden’s App Probably Can’t Protect You From Targeted State Surveillance

8 January 20188 January 2018

Right before Christmas, NSA whistleblower Edward Snowden launched a new app to turn an Android phone into an internet-connected alarm …

Tags Android, Apps, Edward Snowden, Google, Haven, Information Security, Mobile, Mobile Development, Opsec

Security vs. convenience? IoT requires another level of thinking about risk

2 November 2017

Enlarge / IoT products like Amazon Key come with a whole set of risks that consumers aren’t equipped to assess themselves. …

Tags Amazon Key, Best Practices, IoT, Op-Ed, Opsec, Threat Modeling

KRACK For Dummies

16 October 2017

For years security experts have advised users to only connect to password-protected wireless networks to prevent traffic snooping attempts …

Tags Cyber Threats, Hacking, Information Security, KRACK, Opsec, Wi-Fi
Post navigation
Older posts
1 2 Next →
+ More

NVD

CVE-2019-19797 – read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write. …

15 December 2019

CVE-2014-3536 – CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log …

15 December 2019

CVE-2014-3643 – jersey: XXE via parameter entities not disabled by the jersey SAX parser …

15 December 2019

CVE-2014-3652 – JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL. …

15 December 2019

CVE-2014-3699 – eDeploy has RCE via cPickle deserialization of untrusted data …

15 December 2019

EXPLOITS

FTP Commander Pro 8.03 – Local Stack Overflow

13 December 2019

NVMS 1000 – Directory Traversal

13 December 2019

Bullwark Momentum Series JAWS 1.0 – Directory Traversal

12 December 2019

OpenNetAdmin 18.1.1 – Command Injection Exploit (Metasploit)

12 December 2019

Lenovo Power Management Driver 1.67.17.48 – ‘pmdrvs.sys’ Denial of Service (PoC)

12 December 2019

SECURELIST

Kaspersky Security Bulletin 2019. Statistics

12 December 2019

Story of the year 2019: Cities under ransomware siege

11 December 2019

Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium

10 December 2019

APT review: what the world’s threat actors got up to in 2019

4 December 2019

Corporate security prediction 2020

3 December 2019

Information Cyber Network Enterprise Security News

© 2019 GeekWire | Privacy Policy | We are not responsible for the content of external sites.
Scroll back to top
We use cookies to make the site simpler. Please let us know if you agree our Privacy Policy including cookie policy.Yes, I agree