Calling all bug hunters: Sophos teams up with Bugcrowd

Credit to Author: Bill Brenner| Date: Tue, 25 Apr 2017 17:29:38 +0000

Adversarial relationships between vendors and security researchers used to be common. Researchers would report a bug and the vendor &#8211; not all but certainly more than a few &#8211; would drag its feet in patching the problem. Then, the researcher would make the findings public and the vendor would criticize them for releasing information attackers could [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33460&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/mNdfmUH8YgY” height=”1″ width=”1″ alt=””/>

Read more

WikiLeaks Dumps Docs on CIA’s Hacking Tools

Credit to Author: BrianKrebs| Date: Wed, 08 Mar 2017 18:39:11 +0000

WikiLeaks on Tuesday dropped one of its most explosive word bombs ever: A secret trove of documents apparently stolen from the U.S. Central Intelligence Agency (CIA) detailing methods of hacking everything from smart phones and TVs to compromising Internet routers and computers. KrebsOnSecurity is still digesting much of this fascinating data cache, but here are some first impressions based on what I’ve seen so far.

Read more