Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

PCWorld News

Cyberespionage arsenal could be tied to French intelligence agencies

Five additional Trojan programs are related to the Babar malware that Canada's government believes is the work of French intelligence

PCWorld News

Police arrest man in UK over US Defense Department network intrusion

The intrusion resulted in the contact information of 800 DoD employees being stolen from a satellite communications system

windows 10 samsung

Bad news: Windows PCs are also vulnerable to dangerous FREAK encryption attacks

A recently disclosed vulnerability in SSL/TLS implementations also affects Microsoft's Schannel crypto library and Internet Explorer

Adobe invites help with hunting vulnerabilities, but no bounty money

The company offers no bounties, just public kudos.

PCWorld News

Some Bitdefender products break HTTPS certificate revocation

This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic

PCWorld News

Europol and security vendors disrupt massive Ramnit botnet

The operation seized command-and-control servers and Internet domains used by the Ramnit gang

PCWorld News

Facebook fixed 61 high-severity flaws last year through its bug bounty program

The company paid US$1.3 million to 321 outside security researchers in 2014

hacker hand

Million-plus WordPress sites may be vulnerable due to flaw in popular plug-in

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database

PCWorld News

Critical remote code execution flaw patched in Samba

Users should install the Samba updates available for their systems as soon as possible

ssl lock internet

Worse than Superfish? Comodo-affiliated PrivDog compromises web security too

The tool replaces SSL certificates without validating them first, opening the door to man-in-the-middle attacks

superfish in action on apple

Superfish vulnerability traced to other apps, too

The flawed security technique used by Superfish has been found in other software, which has begun a chain reaction of security vulnerabilities.

encryptitall

TrueCrypt security audit back on track after silence and uncertainty

Phase two of the project will begin shortly and will be done by a professional team of consultants

tv with hand on remote stock

Uh-oh: Samsung smart TVs don't encrypt your captured voice data

Samsung TVs send voice search queries to a remote server over an unencrypted connection, a researcher found.

PCWorld News

Microsoft adds HTTP Strict Transport Security support to Internet Explorer

Websites will now be able to instruct the browser to always reach them over HTTPS

malware primary

Fanny superworm uses decoys and cloaking techniques, and probably spawned Stuxnet

The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet.