China State-linked Microblog Service Hacked at Launch
A Twitter-style service offered by a government-linked news site in China was hacked and has since gone offline, according to screenshots posted on the Web.
A Twitter-style service offered by a government-linked news site in China was hacked and has since gone offline, according to screenshots posted on the Web.
Hackers have exploited flaws in a popular open-source advertising software to place malicious code on advertisements on several popular Web sites over the past week.
A former Massachusetts prison inmate has been given an 18-month prison sentence for hacking prison computers while he was incarcerated.
A San Francisco startup plans to release software for the five major smart-phone operating systems to protect data, detect malicious software and allow remote backups.
Security experts are warning that hackers are now using Microsoft’s Live Spaces blogging platform in order to push up the popularity of fraudulent online pharmaceutical sites in a strategy known as search engine poisoning.
With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has been a dynamic year for the IT security and compliance world.
The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers.
The Chinese Ministry of Industry and Information Technology (MIIT) has issued new internet regulations which could mean that many overseas web sites will be unavailable to Chinese readers.
Do you enjoy dominating your house like the Trinity killer on Dexter, knowing exactly what each of your family members are doing at all times? Then Swann has the four camera security system for you.
U.S. authorities are investigating the theft of an estimated tens of millions of dollars from Citibank by hackers partly using Russian software tailored for the attack, according to a news report.
A security researcher has identified more than 8 million Adobe Flash files that make the websites hosting them vulnerable to attacks that target visitors with malicious code.
An Israeli hacker says he has broken copyright protections built in to Amazon's Kindle for PC, a feat that allows ebooks stored on the application to work with other devices.
Однако случилось так, что точка общественного интереса куда-то переместилась или просто исчезла. Компьютер стал подобен телевизору или даже электролампочке. Тоже — чудесам прошлого. Кстати, плохо понимаю, куда завтра переместится этот пик, этот фокус
A federal appeals court on Tuesday upheld a $290 million judgment against Microsoft Corp.
На своем опыте все успели убедиться в том, что антивирус не обеспечивает абсолютной защиты. Пока вирус не попадет в руки специалистов, не будет изучен и не появится сгенерированная под него сигнатура, система остается полностью беззащитной перед новыми угрозами
Телефоны на базе Linux’а мы видели не раз. Но выход смартфона на новенькой Meamo 5, по сути, являющейся Debian’ом, да еще и на машинке с характеристиками, сравнимыми с компьютером, мы пропустить не могли. А потому решили посмотреть, на что же способен этот мобильный линукс и нужен ли он вообще?
By recommending that users exclude some file extensions and folders from antivirus scans, Microsoft may put users at risk, a security company said today.
Twitter's login credentials were used to make DNS changes that redirected surfers to a protest site last Friday, according to site admins.
Over the weekend, a major Typolight security hole was identified that allows hackers to bypass password authentication and gain access to Typolight sites.
Intel has released a patch for its series of silicon-based security protections after researchers from Poland identified flaws that allowed them to completely bypass the extensions.
В этом ролике ты узнаешь, как можно за пару минут поднять собственный прокси-сервер с помощью утилы Pproxy. Сначала хакер выбирает обычный веб-шелл из заначки. Затем заливаем скрипт проксика на удаленный сервер, после чего, запускает локальную часть тулзы на своем компе
A dangerous vulnerability in Internet Explorer 6 and 7 became publicly known before a fix was available, raising the specter of a high-risk zero-day attack.The bug involves the way IE handles Cascading Style Sheets (CSS) objects, and could let an attacker run any command on a targeted Windows XP, Vista, Server 2003, or Server 2008 PC. Bad guys have already posted sample attack code online. IE 8 is not affected
Illegal file sharing levels are still not declining despite a recent crackdown by the government, according to new research from British recorded music industry body the BPI.
A DNS hijacking attack left Twitter temporarily affected for about an hour early on Friday.
Microsoft launched a pilot test program for an online tech-support forum that will be staffed by paid “independent experts.”
The Novell-backed Moonlight project released the final Moonlight 2, an open source Linux/Unix clone of Microsoft's Silverlight framework that offers improved media streaming. Novell and Microsoft also announced that they will continue their Moonlight collaboration and extend Microsoft's patent covenant to Moonlight distributors other than Novell.
Someone hacked into the N.C. Community College System server and accessed Social Security and driver’s license numbers of college user libraries, including more than a thousand users of Pamlico Community College's library.
On Dec. 16, the Seoul police department reported that two Koreans were arrested in China as suspects of the fraud. Park, 27, and his accomplice used a cyber virus to obtain victims’ information, which they used to withdraw money from their bank accounts. They are being charged for breaching information technology network laws. Since late last year, an increasing number of similar frauds have been reported, but this is the first time that actual arrests were made.
Кто-то работает дома, а кто-то в офисе. Но у нас у всех почти одинаковые столы, одинаковые мониторы, одинаковые стулья. Некоторых это не устраивает и появляются такие чудные биологичные рабочие столы с настоящей травкой
Не прошло и трех дней после сдачи моей прошлой статьи, как в голове родилась совершенно новая и куда более эффективная методика работы с Blind SQL Injection. Если ты помнишь, я рассказывал о том, как существенно уменьшить количество запросов к серверу при работе с уязвимостями такого рода
Botnet operators have always been able to easily infect and convert PCs into bots, but they also are increasingly going after servers -- even building networks of compromised servers.
Millions of user passwords to social networking sites have been exposed, after a serious SQL injection flaw on the Rockyou.com website left login details - stored in plain text - up for grabs.
The international hacker who has admitted to stealing more than 130 million payment card numbers has mounted a new defense claim that he might suffer from Asperger's syndrome, a court filing indicates.
The FBI has accused a man of copyright infringement for allegedly uploading to the Web the feature film "X-Men Origins: Wolverine" last spring.
Conficker may be under control, but the malicious family of programs is resident on more than 6.5 million computers worldwide, with more than 5 percent of some network's Internet addresses showing signs of infection.
Users should disable JavaScript in Adobe's Reader and Acrobat tools to protect themselves until a patch for a just-disclosed vulnerability is available, security experts said today.
Malware purveyors are exploiting web vulnerabilities in appleinsider.com, lawyer.com, news.com.au and a dozen other sites to foist rogue anti-virus on unsuspecting netizens.
Public fascination with television's "CSI" forensic detectives and with the virtual reality depicted in the "Matrix" films may be partly responsible for the high level of interest garnered by a Defense Department contest to solve cyber crimes.
As 2009 draws to a close and a new decade dawns, CSOonline has reached out to some of the industry's best known security pros in search of insight on what the next 12 months and beyond have in store for our IT and cyber infrastructure. Each participant was asked to make five predictions.
Research carried out by Bell Micro, the IT systems distributor, claims to show that 67% of organisations believe there is a greater threat to their IT systems security and integrity from within their organisation than from hackers outside.