News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags

Threatpost editors talk about the biggest security news stories for the week ended Jul. 24. Continue reading News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags

Crown Sterling and Black Hat settle lawsuit, promise to never speak of it again

A lawsuit filed in the wake of a controversial cybersecurity presentation last year has ended with a whimper. Crown Sterling, which described itself as an “emerging digital cryptography” company, has entered into a confidential settlement with the company behind the Black Hat security conference. In a lawsuit filed last year, the vendor had accused Black Hat, owned by Informa Tech Holdings, of breach of contract after its content was pulled from the conference website in the aftermath of a sponsored presentation that saw independent cybersecurity researchers heckle Crown Sterling’s CEO. During Crown Sterling’s session at Black Hat on Aug. 8, CEO Robert Grant claimed his company had created an innovative new tool that would set a new standard in encryption with “quasi prime numbers” and “infinite wave conjugations.” Dan Guido, CEO of the consultancy firm Trail of Bits, told Grant he “should be ashamed” for selling technology that other technologists […]

The post Crown Sterling and Black Hat settle lawsuit, promise to never speak of it again appeared first on CyberScoop.

Continue reading Crown Sterling and Black Hat settle lawsuit, promise to never speak of it again

The company behind ‘Time A.I.’ is suing the company behind Black Hat

Makers of a security product that was roundly mocked earlier this month at the Black Hat USA conference are out for revenge against the researchers who scrutinized their technology. Well, if not exactly those researchers, then…someone. Crown Sterling, which describes itself as an “emerging digital cryptography” vendor, filed a lawsuit Thursday accusing UBM, which organizes the Black Hat conference, for alleged breach of contract in connection with a controversy over a sponsored talk delivered during the recent conference. On Aug. 8, Crown Sterling CEO Robert Grant described “Time A.I.,” a technology he claimed would upend the world of encryption with its use of “quasi prime numbers” and “infinite wave conjugations.” Dan Guido, CEO of the consultancy Trail Of Bits, stood up toward the end of the presentation to say Grant “should be ashamed” of himself for hawking technology that others have described as bunk, and predicted Black Hat would remove […]

The post The company behind ‘Time A.I.’ is suing the company behind Black Hat appeared first on CyberScoop.

Continue reading The company behind ‘Time A.I.’ is suing the company behind Black Hat

Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)

Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of security…
The post Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video) appeared first on S… Continue reading Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)

Black Hat 2019 News Wrap: The Best and Worst of the Show

Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session. Continue reading Black Hat 2019 News Wrap: The Best and Worst of the Show

GDPR privacy can be defeated using right of access requests

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) – right of access requests. Continue reading GDPR privacy can be defeated using right of access requests

Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says

LAS VEGAS – Supply-chain attacks have nabbed headlines lately thanks to high-profile incidents like the Wipro news last April, where attackers were able to compromise the staffing agency’s network and pivot to their customers. That incident point… Continue reading Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says

Critical RCE Bug Found Lurking in Avaya VoIP Phones

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant’s most popular models. Continue reading Critical RCE Bug Found Lurking in Avaya VoIP Phones

NSA’s reverse-engineering malware tool, Ghidra, to get new features to save time, boost accuracy

Just five months ago at the RSA conference, the NSA released Ghidra, a piece of open source software for reverse-engineering malware. It was an unusual move for the spy agency, and it’s sticking to its plan for regular updates — including some based on requests from the public. In the coming months, Ghidra will get support for Android binaries, according to Brian Knighton, a senior researcher for the NSA, and Chris Delikat, a cyber team lead in its Research Directorate, who previewed details of the upcoming release with CyberScoop. Knighton and Delikat are discussing their plans at a session of the Black Hat security conference in Las Vegas Thursday. Before the Android support arrives, a version 9.1 will include new features intended to save time for users and boost accuracy in reverse-engineering malware — enhancements that will come from features such as processor modules, new support for system calls and the ability to conduct additional editing, known as sleigh editing, in the Eclipse […]

The post NSA’s reverse-engineering malware tool, Ghidra, to get new features to save time, boost accuracy appeared first on CyberScoop.

Continue reading NSA’s reverse-engineering malware tool, Ghidra, to get new features to save time, boost accuracy