Title Published Date System Number of Articles Actions
Man-in-the-Middle Attack Exploiting Microsoft Update Certificate Vulnerability 2012-06-04 1. Microsoft Update system 2. Remote Desktop service cryptography algorithm used by Microsoft for enterprise customers 3. Terminal Server Licensing Service 4. Windows Update service 5. Rogue Microsoft certificate 6. Flame malware component "Gadget" 7. WPAD (Web Proxy Auto-Discovery Protocol) 1 View Details
Potential Vulnerabilities in Microsoft's Secure Boot Technology. 2012-06-11 1. Secure Boot system [12718] 1 View Details
Employee Turns ESEA Software into Bitcoin-Mining Trojan, Impacting Users 2013-07-09 1. ESEA gaming network software 2. Counter-Strike anti-cheating modes 3. Bitcoin-mining code added by a rogue employee 4. Graphics processing chips on gaming machines 5. Peer-to-peer Bitcoin network 1 View Details
NFC Vulnerabilities Exploited in Samsung and Nokia Devices 2012-07-26 1. Android Beam feature on Samsung Galaxy Nexus 2. Content sharing setting on Nokia N9 running MeeGo 3. NFC technology implementation on smartphones 4. Browser bug on the Samsung Galaxy Nexus 5. Operating system on the Nokia N9 running MeeGo 6. NFC chip security vulnerability 7. Google Wallet technology 8. NFC signal range limitations 9. NFC-based attacks prevention measures 10. NFC chip implementation on movie posters 11. Frictionless-sharing approach on devices 1 View Details
Call of Duty: Black Ops Declassified - Disastrous Software Failure 2012-11-29 1. PS Vita - Call of Duty: Black Ops Declassified game [15840] 1 View Details
MI5's Anti-Terror Supercomputer Delay Impacts Olympic Security 2012-07-14 1. New 'electronic records management' system designed to help MI5 officers track terror suspects [13114] 1 View Details
Misguided Response to False Malware Alert Leads to Costly Destruction 2013-07-10 1. Desktop computers 2. Printers 3. TVs 4. Cameras 5. Mice 6. Keyboards 7. EDA's computer system The software failure incident involved the failure of various hardware components and systems within the Economic Development Administration, including desktop computers, printers, TVs, cameras, mice, keyboards, and the agency's computer system [20576]. 1 View Details
Android Phones Vulnerable to Malicious Code Injection via NFC 2012-07-26 1. Android smartphones [13247] 2. Android feature known as near field communications [13247] 3. Android browser security [13247] 4. Google's "Bouncer" technology for identifying malicious programs in Google Play Store [13247] 1 View Details
Bike-Share Program Delayed Due to Software Glitches and Dispute 2012-08-17 1. 8D Technologies software supplied for successful programs in Boston and Washington [14043] 2. New operating code for the bike-share program in New York City [14043] 1 View Details
Facebook Impersonating Users to Promote Content Without Consent 2013-01-25 1. Facebook's Sponsored Stories ad product 2. Facebook's Related Posts feature 1 View Details