ICYMI: Panama leak; Ethical Top 15; What'sApp encryption; door hack
ICYMI: Panama leak; Ethical Top 15; What'sApp encryption; door hack

Email server hack behind Panamanian law firm leaks?

External sources, not insiders, were behind the loss of eleven million confidential tax haven documents according to initial reports that claimed an email server hack was behind the leaking of top-secret documents from Panamanian law firm, Mossack Fonseca. But later reports asserted that an insider was a more likely source of the eleven million leaked confidential documents reportedly detailing locations of money in tax havens around the world.  More

The 15 most successful ethical hackers worldwide

A new infographic from Nimbus Hosting lists some of the world's most successful and profitable bug bounty hunters that have discovered little glitches with disastrous potential and been rewarded for their efforts. More

[Updated] Panama Papers: Who let the docs out?

Exfiltration of 2.6 terabytes of data from the Panama-based law firm Mossack Fonseca has been countered by an equally uninformative explanation for how this international organisation, with a class A customer list, allowed itself to be turned over. The story began a year ago when a German journalist, who works for the newspaper Sueddeutsche Zeitung, was contacted by an anonymous source who insisted on the use of encrypted communications for every contact. More 

WhatsApp end-to-end encryption

The encrypted communications app, whose application can be found on one billion devices, has switched on end-to-end encryption (e2e2).  Data is now encrypted at the point of transmission, transit and reception. Access to the data is restricted to the sender and the person who was meant to receive it. WhatsApp is not the first, nor is it unique: Apple's iMessage system also uses this type of encryption, as does PGP.  More

Root vulnerability gives hackers remote control of doors

A new root vulnerability, allows hackers to easily open networked door controllers in airports, university campus, hospitals, government facilities and other organisations. Rickey Lawshae, researcher with Trend Micro's DVLabs division, says HID Global's VertX and Edge controllers can be remotely managed by attackers over the network and a service called discoveryd that listens to UDP probe packets on port 4070.  More