Secure your wireless router

Tuesday, March 24th, 2015

There is no such thing as perfect security. Given enough knowledge, resources, and time any system can be compromised. The best you can do is to make it as difficult for an attacker as possible. That said there are steps you can take to harden your network against the vast ...

All Major Web Browsers Fall in Pwn2Own Hacking Contest

Friday, March 20th, 2015

Security researchers nabbed $552,500 in bounties at this year's Pwn2Own hacking contest, demonstrating exploits against the top four Web browsers, plus Adobe Reader and Flash Player. On Thursday, the second and final day of the competition, the star of the show was South Korean security researcher JungHoon Lee, aka "lokihardt," who ...

Tracking the FREAK Attack

Tuesday, March 3rd, 2015

On Tuesday, March 3, 2015, researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptogrpahy, which can then be decrypted. There are several posts that discuss the attack in detail: ...

Software Privdog worse than Superfish

Sunday, February 22nd, 2015

tl;dr There is a software called Privdog. It totally breaks HTTPS security in a similar way as Superfish. In case you haven't heard it the past days an Adware called Superfish made headlines. It was preinstalled on Lenovo laptops and it is bad: It totally breaks the security of HTTPS connections. The ...

Malware Is Still Spying On You Even When Your Mobile Is Off

Friday, February 20th, 2015

Most of us have seen Hollywood movies where hackers trace and spy on mobile devices even though they are switched off. Like most things in spy movies, we disregard it as fiction. However, recent malware discovered by the AVG mobile security team may change this preconception. This malware hijacks the shutting down ...