"Script fails, thousands of Mozilla developer emails, passwords possibly exposed"
The script for a data sanitization process on the Mozilla Developer Network failed and the email addresses and passwords of thousands of users was publicly accessible. Read more
"PayPal addressing another two-factor authentication bypass"
An Australian researcher has discovered and posted a method for getting past PayPal's two-factor authentication, but it requires primary credentials. Read more
"NIST drafts updated guidance for agencies assessing security, privacy"
The guidance gives federal agencies improved assessment procedures for securing their information systems and networks. Read more
"Black Hat keynote talks cyber policies for field's future"
On Wednesday, Dan Geer delivered his keynote called "Cybersecurity as Realpolitik" at Black Hat. Read more
"Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel"
An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings. Read more
"Black Hat: Hidden controls open 2 billion mobile devices to exploitation"
A pair of researchers from Accuvant at the 2014 Black Hat conference showed how the OMA-DM protocol can be leveraged to gain access to mobile devices. Read more
"Black Hat: Airport security equipment at risk"
Bugs in trace detection scanners, x-ray machines and time and attendance clocks could make them vulnerable to attack, according to experts at this year's Black Hat conference. Read more
"Android malware SandroRAT disguised as mobile security app"
Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app. Read more
DefCon: Traffic control systems vulnerable to hacking
Cesar Cerrudo spoke at DefCon about how traffic control systems used in the U.S. and other countries can be hacked. Read more
This week’s news centers around our coverage of Black Hat in Las Vegas. In one session, a researcher detailed how he learned to control hotel rooms devices. In another, airport security devices’ vulnerabilites were discussed. For a closer look at these articles, click here to visit our news section.