Two German researchers are calling into question the security afforded by AMD’s Secure Encrypted Virtualization feature debuting in the chip maker’s upcoming Zen server chips.
News in brief: porn database hacked; Obama call to Trump; MPs move on Snooper’s Charter
Your daily round-up of what else is in the news
News in brief: meals on robot wheels; Mirai blamed for new attacks; police bypass iPhone encryption
Your daily round-up of what else is in the news
New Cerber Variant Leverages Tor2Web Proxies, Google Redirects
Researchers have discovered that criminals behind the latest Cerber ransomware variant are leveraging Google redirects and Tor2Web proxies in a new and novel way to evade detection.
Hackers Make New Claim in San Francisco Transit Ransomware Attack
The San Francisco Municipal Transport Agency says it has contained a ransomware attack, but now it faces new unsubstantiated claims by attackers who say they have 30GB of the agency’s data.
Guest post: Cybersecurity school to open at Bletchley Park, home of the wartime codebreakers
Dr Sue Black, author of ‘Saving Bletchley Park’, welcomes the new cybersecurity school being set up at Bletchley Park, the iconic wartime codebreaking centre
Microsoft Cutting Off SHA-1 Support in February for Edge, IE 11
Microsoft confirmed Feb. 14, 2017 is the cutoff date for SHA-1 support in its Microsoft Edge and Internet Explorer 11 browsers.
iPhone Call History Synced to iCloud Without User Consent, Knowledge
Security experts warn iPhone call history data may be synced to iCloud accounts without user knowledge, making personal phone records an easy target for a determined third-party.
Google Removing SHA-1 Support in Chrome 56
Google released its final SHA-1 deprecation deadlines, and crypto services provider Venafi said that 35 percent of the web is still running weak SHA-1 certificates.
Cryptsetup Vulnerability Grants Root Shell Access on Some Linux Systems
A vulnerability in cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue shell on some systems.