China to prosecute Google hackers if evidence shows
If evidence is presented that attacks on Google originated in China, authorities there said they will punish those responsible.
If evidence is presented that attacks on Google originated in China, authorities there said they will punish those responsible.
Today one of our colleagues received a brand new Vodafone HTC Magic with Google’s Android OS. “Neat” she said. Vodafone distributes this phone to its userbase in some European countries and it seems affordable as you can get it for 0€ or 1€ under certain conditions.
Прими участие в конкурсе компании Jetbalance и сайта Хакер!
Социальные сети внезапно стали очень популярны. Сейчас социальная сеть – это и способ пообщаться, и найти друзей, а для кого-то – заработать деньги. И нет ничего удивительного, что каждый захотел создать свою соцсеть. Как раз для этого был написан простой, удобный (и, как позже выяснилось, изобилующий уязвимостями) движок
Secretary of the Department for Homeland Security (DHS) Janet Napolitano has announced a new initiative to educate the public and private sector about the need for cybersecurity.
Standard operating procedure for the identity theft industry involves performing high-volume fraudulent transactions as quickly and quietly as possible. But now researchers have found evidence of a new hacking group that takes a different approach--one that's less discreet and more destructive.
More and more personal, private information is being used and stored online than ever before, and at the same time, attacks on that information are increasing in frequency and sophistication. Phishing is a growth industry—it's very profitable to trick people into handing over names, passwords, credit card numbers, and so on, so that their finances can be pillaged. Important activities like banking and filing tax returns are being performed, and these need strong proof of identity
First, Google reported that it, along with a bunch of other major companies, had been hacked, and pointed the finger at China.
The Dutch police and intelligence services tapped at least 3350 internet connections in 2009. An increase of 385 percent since 2006.
North Korea's self-developed software operating system named the "Red Star" was brought to light for the first time by a Russian satellite broadcaster yesterday.
Привет, коллега! Сегодня мы поговорим о таком важном компоненте Windows как диспетчер кэша. Узнав теорию и попробовав практику, ты можешь свернуть горы, поверь мне. Нужно лишь знать азы отладки, а остальное освоим вместе.
M86 Security released a new report revealing its Security Labs research results based on the primary attack vectors on the Web and how the common approaches used to fend off these attacks stand up in today’s dynamic threat landscape.
While Google called a cyber-attack against its network last January a "highly sophisticated and targeted attack," security experts said the techniques show the attackers to be nothing more than "amateurs."
BlackBerry has gained a reputation in the mobile space during the past decade or so as the "most secure" handheld device and mobile platform available. That's largely due to RIM's BlackBerry Enterprise Server (BES) software for corporate e-mail deployments, which has earned high-level security certifications from some of the world's most demanding information-security organizations, including the U.S
The Obama administration on Tuesday declassified part of its plan for making cyberspace more secure, a move meant to foster greater co-operation between government and civilian groups in an area of increasing urgency.
The biggest threat to the open internet is not Chinese government hackers or greedy anti-net-neutrality ISPs, it’s Michael McConnell, the former director of national intelligence.
How will we ever get a leg up on hackers who are infecting computers worldwide? Microsoft's security chief laid out several suggestions Tuesday, including a possible Internet usage tax to pay for the inspection and quarantine of machines. Today most hacked PCs run Microsoft's Windows operating system, and the company has invested millions in trying to fight the problem.
Software giant Microsoft Corp has won a U.S. court approval to deactivate a global network of computers that the company accused of spreading spam and harmful computer codes, the Wall Street Journal said.
Tomorrow vulnerability specialists Secunia will announce that this year it will release free patch management software to all in a bid to cut web attack vectors.
Open source software has comparable security, faster bug fixing, and fewer potential backdoors than commercial software, according to a study on software application vulnerabilities by security firm VeraCode.
Four California men were charged on Monday with using sophisticated computer programs to fraudulently obtain more than a million tickets to concerts and sporting events and reselling them for a profit estimated at $29 million.
Microsoft is looking into a new flaw that could let hackers run code if they can convince users to hit the 'F1' key in response to a pop-up window.
Enrique Salem, President and Chief Executive Officer of California-based Symantec Corporation, warns against a cold war of an unusual kind.
Here’s some troubling news for my fellow World of Warcraft players. It seems that hackers, account thieves, and other miscreants have now embraced man-in-the-middle (MITM) attacks to further their evil ways. Blizzard says it’s not a widespread issue, and it’s rather difficult to pull off, but it’s something y’all should be aware of.
Qualys has announced they'll be offering free scans to help keep websites clean. By using baseline tests, Qualys can tell when a website deviates from normal operating conditions. The scans are automated, so there's no need to manually kick it off every day, and Qualysguard Malware Detection will also identify the vulnerable code so the developer can quickly remove it.
In late 2008, a Pennsylvania teenager playing SOCOM U.S. Navy Seals got kicked out of a tournament for using a cheat mod. So he took revenge by crashing the PlayStation web site for 11 days.
Data security vendor, Imperva, likens the 'industrialisation of hacking' to the way the industrial revolution of the 19th century revolutionised factories.
A prominent security researcher has released an exploit that uses a new technique to defeat ALSR + DEP on Microsoft’s Windows operating system.
Диспетчер System Center Configuration Manager 2007 является усовершенствованным вариантом Systems Management Server и призван обеспечивать в динамично изменяющихся средах возможность по управлению и полному контролю над всей IT-инфраструктурой
Скринкасты сейчас в моде. С одной стороны, лучше один раз увидеть, чем сто раз услышать или прочитать, с другой стороны, постоянно снижающиеся цены на трафик и почти безразмерное пространство на хостингах, — все это делает скринкасты доступным средством продемонстрировать что либо
The Department of Defense granted military personnel access to Facebook, Twitter, Google Apps and other user-generated applications in a Feb. 26 memorandum. The move followed a review that began last August after the U.S. Marines and U.S. Army released contrasting policies for social network site use. The DOD clearly is trying to strike a balance between national security and acceptable social communication and collaboration
The cyber criminals who hacked into Google’s systems may have attacked over 100 other companies, according to new information from security consultancy Isec partners.
Microsoft has several other botnets in its crosshairs, and believes it can use the same legal tactic against them that it deployed last week to strike at the Waledac botnet's command-and-control centers.
International hotel group Wyndham Hotels and Resorts (WHR) has suffered yet another serious data breach after hackers broke into its computer systems, stealing customer names and payment card information.
Fraudsters stole the identity of a top Midland cop to bombard people with offers of porn and Viagra on social network site Twitter.
Fraudsters stole the identity of a top Midland cop to bombard people with offers of porn and Viagra on social network site Twitter.
Affinity Multimedia Design, the company which designed www.newbritainct.gov (the website for New Britain City), said that a virus attacked the site after infiltrating PCs at the main city hall.
An internet criminal who helped run a "Facebook for fraudsters" has been sentenced in London to four years and eight months in prison.
Waledac -- the spamming botnet formerly known as Storm -- was downed yesterday in a sneak attack by a team from Microsoft, Shadowserver, the University of Washington, Symantec, and a group of researchers from Germany and Austria who had first infiltrated the botnet last year.
Microsoft has warned Windows users to be on their guard against a piece of rogue antivirus software passing itself off as Microsoft Security Essentials.