Security Alerts & News
by Tymoteusz A. Góral

History
#22 Online security conferences
Every month there are numerous cyber security conferences all around the world. Many of them post their talks on YouTube after the conference. The article lists talks from numerous security conferences. Go on, attend a free security conference from the comfort of your home or office!
#21 Researchers find two flaws in OAuth 2.0
Security researchers from the University of Trier have discovered a couple of vulnerabilities in the OAuth 2.0 authentication protocol that could enable hackers to subvert single sign-on systems. The protocol is widely used on social networking sites, such as Facebook and Google+, to authenticate users.
#20 Confirmation of a coordinated attack on the Ukrainian power grid
After analyzing the information that has been made available by affected power companies, researchers, and the media it is clear that cyber attacks were directly responsible for power outages in Ukraine.
#19 Trend Micro password manager had remote command execution holes and dumped data to anyone
Google's Project Zero discovered multiple trivial remote code execution vulnerabilities sitting within a password manager installed by Trend Micro as default alongside its AntiVirus product. An attacker could thereby obtain an unecnrypted dump of all stored logins and passwords.
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12