Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

BitTorrent fixed a vulnerability that would have allowed attackers to hijack BitTorrent applications used by hundreds of millions of users in order to amplify distributed denial-of-service (DDoS) attacks.

generic image of a wi-fi router

Some routers vulnerable to remote hacking due to hard-coded admin credentials

Several DSL routers from different manufacturers contain a guessable hard-coded password that allows accessing the devices with a hidden administrator account.

Tor security concerns prompt largest dark market to suspend operations

Administrators of Agora, the largest online black marketplace operating on the Tor anonymity network, decided to temporarily suspend the website because of possible attacks based on recent methods of exposing Tor Hidden Services.

150817 google marshmallow 03

Certifi-gate flaw in Android remote support tool exploited by screen recording app

An application hosted in Google Play until yesterday took advantage for months of a flaw in the TeamViewer remote support tool for Android in order to enable screen recording on older devices.

Security in cloud computing

Plenty of fish, and exploits too, on dating website

Recent visitors to Plenty of Fish, an online dating website with over 3 million daily active users, had their browsers redirected to exploits that installed malware.


Vulnerability in enterprise-managed iOS devices puts business data at risk

A vulnerability in the iOS sandbox for third party applications, like those installed by companies on their employees' devices, can expose sensitive configuration settings and credentials.

Adobe patches important flaw in LiveCycle Data Services

Adobe Systems released a security patch for LiveCycle Data Services, a development tool used by businesses to synchronize data between back-end servers and rich Internet applications built with Adobe Flex or AIR.

Internet company hit by credit card breach

Hackers breached the computer systems of Internet services provider Group and stole credit card information of 93,000 customers.

Attackers increasingly abuse insecure routers and other home devices for DDoS attacks

Attackers are taking advantage of home routers and other devices that respond to UPnP requests over the Internet in order to amplify DDoS attacks.

android devil malware

Another serious vulnerability found in Android's media processing service

The Android service that processes multimedia files has been the source of several vulnerabilities recently, including a new one that could give rogue applications access to sensitive permissions.

BitTorrent programs can be abused to supercharge denial-of-service attacks

Attackers could launch crippling attacks by reflecting the traffic through millions of computers running BitTorrent programs

PCWorld News

Zero-day flaw in Google Admin app allows malicious apps to read its files

Attackers could obtain credentials used to manage Google for Work accounts

PCWorld News

Cisco warns customers about attacks installing rogue firmware on networking gear

Compromised administrative credentials were used to flash malicious boot firmware on Cisco IOS devices

cyberattack stock image

Ten scary hacks I saw at Black Hat and DEF CON

While cyber security is increasingly important, researchers show how little of it we actually have.

wifi hack

Hackers show off long-distance Wi-Fi radio proxy at DEF CON

The device uses the 900MHz band, but hides the data in the background radio noise.