Title Published Date System Number of Articles Actions
Facebook Android App Causing Battery Drain and Slowing Down Phones 2016-02-01 1. Facebook Android app - The Facebook Android app failed to perform efficiently, causing performance issues, battery drain, and impacting the overall performance of Android smartphones [39618]. 1 View Details
Brain Wallet Software Vulnerability Exposes Bitcoin Users to Theft 2015-07-08 The system that failed in the software failure incident described in the article is the concept of "brain wallets" for storing bitcoins. Specifically, the failure lies in the vulnerability of brain wallets due to the inability of users to choose strong, random passphrases, making it easy for hackers to crack the passphrases and steal the digital cash stored in them. 1. Brain wallets for storing bitcoins [37997] 1 View Details
Unpatched Adobe Flash Security Flaw Exploited by Malware Developers 2015-07-08 1. Adobe Flash - Unpatched security flaw [38029] 2. Hacking Team's "remote control service" - Zero-day vulnerabilities [38029] 1 View Details
Adobe Flash Plugin Vulnerabilities Lead to Calls for End-of-Life. 2015-07-14 1. Adobe Flash plugin [38030, 52325] 2. Mozilla Firefox browser [38030] 3. Microsoft Silverlight [38030] 4. HTML5 [38030] 5. Google Chrome browser [38030] 6. Apple iPhone and iPad [38030] 2 View Details
Internet of Things Vulnerabilities Exposed by Shodan Search Engine 2016-01-25 The software failure incident mentioned in the article primarily involves the failure of internet-connected devices due to vulnerabilities and insecurities. The systems that failed in this incident include: 1. Internet-connected webcams with predictable default passwords or no passwords at all [39817]. 2. Shodan search engine, which scans every internet-connected device looking for vulnerabilities and insecurities [39817]. 3. Insecam, a site that collated and aggregated web cameras for voyeuristic purposes [39817]. 4. Manufacturers of internet of things devices that do not prioritize security, leading to widespread vulnerabilities [39817]. 5. Lack of regulatory oversight and enforcement to ensure internet-connected devices meet security standards [39817]. 1 View Details
Data Breach at Ashley Madison Exposes User Information. 2015-08-21 1. Lack of appropriate safeguards in place for sensitive personal information, including a lack of documented information security policies and an explicit risk management process [Article 46911]. 2. Failure to adequately train staff at all levels on security and privacy obligations [Article 46911]. 3. Retaining customer information even after users had deleted or deactivated their accounts, without providing a clear option for users to withdraw consent for their information being held by the site [Article 46911]. 2 View Details
Wireless Key Fob Vulnerability Exploited by RollJam Attack 2015-08-06 1. Keeloq system by Microchip 2. Hisec chips by Texas Instruments 3. Dual Keeloq system by Microchip 1 View Details
Tesla Model S Vulnerability Exploited by Researchers at Defcon 2015-08-09 1. Tesla Model S' information systems [38979] 1 View Details
Firefox Vulnerability Allows File Upload Hack on Windows and Linux 2015-08-07 1. Mozilla Firefox browser (vulnerable versions prior to 39.0.3) [38978] 1 View Details
Excel Autoformatting Errors in Genetics Research Papers. 2016-08-26 The system that failed in the software failure incident described in the article is: 1. Microsoft Excel - The automatic date formatting feature in Microsoft Excel caused errors in gene lists in scientific papers [46877]. 1 View Details