Access Control

Access Control news, trend analysis and opinion

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

The 'grinch' isn't a Linux vulnerability, Red Hat says

The way Linux handles user permissions could still lead to potential misuse, security researchers say


Vulnerability in embedded Web server exposes millions of routers to hacking

Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them

NAC Renaissance

Mobile devices, cloud computing, and security concerns are driving increasing use of granular network access controls.

death of antivirus

Death of antivirus software greatly exaggerated

After years of predicted demise, AV software continues to protect.

Microsoft Patch Tuesday addresses Exchange and Explorer flaws

Microsoft issued 7 security patches for the month

Forgotten subdomains boost risk of account hijacking, other attacks

Some sites have subdomains pointed at old domains that have long expired and can be registered by attackers

Attackers knock PlayStation Network offline for hours

The Lizard Squad, a group that carried out a similar attack against the Sony service in August, took credit for the downtime

Vodafone blocks Chaos Computer Club site, fueling 'Net censorship concerns in UK

Over-blocking is a common issue with Internet filters run by ISPs in the U.K., digital rights group says

Technical evidence links destructive malware to attack against Sony Pictures

The malware contains usernames, passwords and an image associated with Sony Pictures Entertainment, researchers said

IBM fixes serious flaw in Endpoint Manager for mobile device management

The flaw can be exploited to execute arbitrary code on the management server

PoS malware also targeting ticket vending machines and electronic kiosks

Researchers found a new malware program that can steal information from a large number of point-of-sale systems

Bitdefender security appliance for home networks seeks to replace end-point antivirus

Bitdefender BOX can replace or run alongside a home router to scan all network traffic for security threats

Citadel malware now targets password management applications

A new Citadel configuration steals the master keys for two password managers and a secure authentication program

Activists release Detekt tool that finds surveillance malware

The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists

USB Armory is the Swiss army knife of security devices

A USB-stick computer built around a processor with strong security capabilities

New ransomware CoinVault allows users to decrypt one file for free

Cybercriminals use freebie tactic in attempt to increase ransomware success rate

Microsoft: Competing AV vendors need to remember who the bad guys are

Some vendors, particularly in China, are playing hardball to get their antivirus products installed

Adobe fixes eighteen vulnerabilities in Flash Player

Fifteen of them are critical and can result in remote code execution

headingpic

RADIUS versus TACACS+

An explanation and comparison of RADIUS and TACACS+ for Authentication, Authorization and Accounting (AAA).

Load More