Lucian Constantin

Romania Correspondent

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

LastPass is scrambling to fix another serious vulnerability

Apple: Macs and iPhones are safe from newly revealed CIA exploits

Apple: Macs and iPhones are safe from newly revealed CIA exploits

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.

LastPass fixes serious password leak vulnerabilities

LastPass fixes serious password leak vulnerabilities

Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.

Hackers threaten to wipe millions of Apple devices, demand ransom

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them $150,000

Flaws in Moodle CMS put thousands of e-learning websites at risk

Flaws in Moodle CMS put thousands of e-learning websites at risk

Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.

 Pwn2Own hacking contest ends with two virtual machine escapes

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

Some HTTPS inspection tools might weaken security

Some HTTPS inspection tools might weaken security

Many security products that intercept HTTPS traffic don't properly validate certificates, US-CERT has warned

String of fileless malware attacks possibly tied to single hacker group

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.

It's time to turn on HTTPS: the benefits are well worth the effort

It's time to turn on HTTPS: the benefits are well worth the effort

HTTPS websites get a speed boost, better search engine rankings, and fewer browser warnings

How much are vendor security assurances worth after the CIA leaks?

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

Leaked docs suggest NSA and CIA behind Equation cyberespionage group

Leaked docs suggest NSA and CIA behind Equation cyberespionage group

With its sophisticated tools and longstanding operations, Equation is considered the most advanced cyberespionage group in the world

CIA false flag team repurposed Shamoon data wiper, other malware

CIA false flag team repurposed Shamoon data wiper, other malware

The code reuse was meant to reduce costs of development, but to also make the agency's malware blend in with other threats

Load More