News Roundup: Ubisoft hacking attack suffers big names to schedule the NSA surveillance events and Android researchers found "master key" vulnerability

4:10:00 PM
News Roundup: Ubisoft hacking attack suffers big names to schedule the NSA surveillance events and Android researchers found "master key" vulnerability -

Ubisoft warns against the hacking attack

million video game publisher Ubisoft has warned players of video games that has recently undergone another security breach. The company says that the user names, email addresses and encrypted passwords were all compromise but as bank details such as credit card numbers and debit must be sure they are not stored on the site. It is estimated that nearly 58 million users have an account with Ubisoft at the time of the hack. The company recommends that users change their password for Ubisoft and other accounts with the same login credentials. This is the third security breach reported in one year, but the company said it does not believe that the attacks are related.

The protests provided on NSA Surveillance

Some of the biggest names in the Internet, including WordPress, Mozilla and Reddit have joined the mass protests against surveillance recent NSA controversy. The movement, named 'Restore the fourth "in a reference to the Fourth Amendment, provides around 100 events around the United States to date. Besides the events, several sites provide displaying protest messages in a move that will remind many people fight against piracy law protests last year, during which the Web sites and Wikipedia Google 'has become black "or censored themselves with black boxes for 24 hours to raise awareness of the bills.

researchers discovered Android "master key"

security research firm Bluebox discovered a "master key" that could give cyber criminals almost without restriction access to any Android device. The "master key" could allow an attacker to access data, eavesdrop and send unwanted messages, and is present in every single Android versions since 09. Android uses the cryptographic verification for the programs installed on its devices BlueBox and found a way to fool this verification method thinking that unusual and malicious changes to applications are normal. The plan of the research firm to release more details about the vulnerability at the Black Hat hacker conference this August. Google has not commented.

Previous
Next Post »
0 Komentar