Ricoh boosts printer security
Printer manufacturer Ricoh has launched a new document security solution designed to help firms monitor printer usage and lock down access to sensitive documents.
Printer manufacturer Ricoh has launched a new document security solution designed to help firms monitor printer usage and lock down access to sensitive documents.
The massive Operation Aurora cyber attack last month, apparently launched from command and control server computers in Taiwan, is part of a larger and sustained effort that has been stealing data for years.
The massive Operation Aurora cyber attack last month, apparently launched from command and control server computers in Taiwan, is part of a larger and sustained effort that has been stealing data for years.
Veracode today released Blackberry-specific spyware, which the code-review specialist intends as a “call for defensive research” to show that the BlackBerry is vulnerable to spyware problems.
Salute, my dear admirer of the Backstreet Boys band! Today I will tell you an interesting story about how backstreetboys.com, myspace.com/backstreetboys, and also the twitter.com/backstreetboys (the main network resources of your favorite band) had capitulated like a house on fire, with no fight. It all started with the fact that one day the notorious column editor alluded to continue the theme of hacking the well-regarded foreign celebrities
В случае успешного взлома сервер может быть использован для рассылки спама, распространения вареза, организации атак на другие хосты, кроме того, могут быть украдены или уничтожены важные корпоративные данные. Конечно, своевременный бэкап позволит восстановить все в первоначальное состояние, но не факт, что через некоторое время инцидент не повторится вновь
An analysis of over 1900 penetration tests and 200 actual security breaches over the last year has show that over four out of five security problems come from third party suppliers.
Security researchers have defeated vulnerability protections baked into the latest versions of Internet Explorer, demonstrating that it's possible to poke holes in a safety net that's widely relied on to keep end users safe from drive-by exploits.
IT security firm Sophos today released a list of the top ten countries hosting malware on the web, indicating which territories are the biggest offenders. Sophos detected over 50,000 newly infected web pages every day with its findings revealing that the problem of compromised websites is truly global.
After removing Google's Android driver code from the Linux kernel, Novell Fellow and Linux developer Greg Kroah-Hartman has argued that the mobile OS is incompatible with the project's main tree.
A growing emphasis by computer hackers on stealing payment card data from hotels and resorts and their increasingly sophisticated malicious software and attack methods are two highlights in a new report from security consulting and technology firm Trustwave Holdings Inc.
Activists have long grumbled about the privacy implications of the legal "backdoors" that networking companies like Cisco build into their equipment--functions that let law enforcement quietly track the Internet activities of criminal suspects. Now an IBM researcher has revealed a more serious problem with those backdoors: They don't have particularly strong locks, and consumers are at risk.
Christopher Tarnovsky, who operates the California-based consulting firm Flylogic Engineering, must strike dread into the heart of anyone working on secure computer chips.
A bug in the design of the Oracle database -- the world's top-selling software for storing electronic information -- could allow hackers to break into private databases via the Internet, said David Litchfield, chief research scientist of NGSSoftware Ltd, a UK-based computer security company.
Sticking to the rules of the cat-and-mouse game between the iPhone Dev Team and Apple, the former has been able to confirm that iPhone OS 3.1.3 IPSWs are jailbreakable by the group’s redsn0w jailbreak tool. Supported devices currently include the iPhone 2G (first-gen iPhones), iPhone 3G, and iPod touch 2G (second-gen iPod touch).
Пираты побеждают. Дело не только в том, что Пиратская партия Швеции — уже в Европарламенте, а обвинительный приговор, которым завершился процесс против владельцев одного из крупнейших торрент-трекеров Pirate Bay, не остановил работу сайта
A Chinese government official has said that his country is the world’s leading target in hacking attacks.
A report (PDF) into the security of banking internet systems has found that one of the biggest problems faced is the reuse of login passwords by customers.
Apple's iPhone is vulnerable to exploits that allow an attacker to spoof web pages even when they're protected by the SSL, or secure sockets layer, protocol, a security researcher said.
iDefense is warning users of several critical vulnerabilities in several versions of its online media application, RealPlayer, that could open the door for a remote code execution attack on both Windows and Mac systems, according to iDefense Labs security blog.
They go by names such as Piratecrackers, Yourhackers and Slickhackerz. Although illegal, a handful of internet services brazenly advertise that for a usual hundred dollar fee they can obtain almost any email password. One site boasts that it provides an ideal way to catch a cheating spouse or significant other.
A mysterious flood of SSL packets from the Pushdo botnet, possibly an attempted DDOS attack, is not succeeding, according to the Internet Storm Center. None of the attacked sites are experiencing significant outages.
Ежесекундно по интернет-каналу корпоративной сети проходят тысячи пакетов. Часть из них нацелена на то, чтобы обойти все заслоны и нарушить работу сетевых сервисов или предоставить их автору базу для рассылки спама. И здесь на помощь администратору приходят системы обнаружения атак, позволяющие вовремя среагировать на угрозу
Представь, что ты администратор Сети и в руках твоих Nokia N900, основанный на MAEMO. Ты весь в делах и разъездах и твой мобильный компьютер - единственная связь с твоей подведомственной локалкой и внешними сетями. Рулить ими надо всерьез и надолго - конечно при помощи N900
A new Website launched today called Security Scoreboard includes information on more than 600 security vendors and their products, as well as customer reviews. The site is aimed at CISOs, CIOs, and others looking for a one-stop shop to find security product and services information.
Five months after Ameriprise Financial fixed a bug that could have helped criminals steal user authentication credentials, the financial giant's website is vulnerable again.
Microsoft's Internet Explorer 8 (IE8) became the world's most popular browser during January, gaining 22.31 per cent of the market and overtaking IE6 for the first time.
Adobe's Flash technology has been the target of security researchers for several years, though often it's the Flash Player that gets the bulk of the attention. Mike Bailey, a senior security analyst with Foreground Security, is now turning the focus to how common programming bugs can enable Flash objects to attack Web sites.
As more organizations allow employees to use social media like Facebook and Twitter at work, cybercrime attacks on these networks have exploded, according to a report released Monday by IT security firm Sophos. Reports of malware and spam rose 70 percent on social networks in the last 12 months, the security survey reveals.
Matthew Delorey was a 26-year old with a business plan: selling hacked cable modems. This is the sort of business that a budding entrepreneur should probably keep on the down-low, or at least limit to those tiny text ads at the back of magazines where satellite descramblers are sold, but that's no way to rake in the cash.
Hackers calling themselves the Iranian Cyber Army hijacked the website of a Dutch-based Persian language radio station at the weekend, weeks after doing the same to China's Baidu Inc search engine and Twitter.com.
International Telcommunications Union secretary general Hamadoun Toure has called for a treaty to avert possible cyber war at the World Economic Forum. During a debate on when a cyber attack becomes a declaration of war, Toure called for a treating that would bind nations to not launch the first cyber attack.
For the right price, you can now buy a Twitter account user name and password. Researchers at Kaspersky Labs claim that hackers are attempting to sell compromised Twitter accounts for up to $1,000.
A highly sophisticated hacking operation that led to the leaking of hundreds of "climategate" emails from the Climatic Research Unit in East Anglia was probably done by a foreign intelligence agency, says the British Government's former chief scientist.
BitTorrent has plenty of practical and legal uses, but sadly, if you're one of the millions of people using it, you're probably breaking the law. A student at Princeton University by the name of Sauhard Sahi has conducted a study of more than 1,000 random files acquired using the trackerless Mainline DHT, and found that more than 99% of them infringe on copyrights. I somehow doubt this news will shock or amaze you, but at least one interesting discovery was made and it makes a pretty compelling argument against those who would try to claim that DRM helps prevent piracy.
Все мы пользуемся каким-то перечнем привычных программ, но рано или поздно привычные инструменты становятся хуже — перегруженные функционалом, медлительные, глючные или просто за новую версию опять просят денег. Так мы приходим к вопросу: а что есть еще такого как моя программа, но лучше?
Приветствую тебя, уважаемый почитатель буржуйского бойс-бенда Backstreet Boys! Сегодня я расскажу занимательную историю о том, как быстро и без боя сдались backstreetboys.com, myspace.com/backstreetboys, а также twitter.com/backstreetboys - основные сетевые ресурсы твоей любимой группы
The Central Intelligence Agency, PayPal, and hundreds of other organizations are under an unexplained assault that's bombarding their websites with millions of compute-intensive requests.
Underscoring a little-known web vulnerability, hackers are exploiting a weakness in the Mozilla Firefox browser to wreak havoc on Freenode and other networks that cater to users of internet relay chat.
A hacker broke into 49 House websites and defaced the front pages with obscene comments about President Obama.