Временная скидка 60% на годовую подписку!

Social networking hacks: Top 10 Facebook and Twitter security stories of 2009

Facebook and Twitter use skyrocketed in 2009, and naturally the social networking sites became magnets for hacker attacks and sparked other types of privacy concerns. CIOs have expressed doubts about the social networking sites, and these stories show there is good reason to be worried. Here, in chronological order, are the top 10 security and privacy stories concerning Facebook and Twitter from the past year.

Top Five Data Security Trends for 2010

With 2009 behind us, we look forward to what the next year might bring. The question of what changes might be coming in terms of data security begs answering. The ongoing battle between hackers and the teams defending sensitive information means that the techniques in use by both sides last year will be updated, and the better you are able to predict what the other side may do, the more likely you will be prepared to defend against it

Top Five Data Security Trends for 2010

With 2009 behind us, we look forward to what the next year might bring. The question of what changes might be coming in terms of data security begs answering. The ongoing battle between hackers and the teams defending sensitive information means that the techniques in use by both sides last year will be updated, and the better you are able to predict what the other side may do, the more likely you will be prepared to defend against it

Hackers Compromise Fox Sports Website

According to a warning released by security researchers, the Fox Sports website, an integral part of the Fox Broadcasting Company, has gone under the control of unknown hackers. The hackers injected malware inside the 'custom error' section of the site. Two different malicious codes have been found, each as a result of a different infection.

Конкурс OLDI Computers

Одним из преимуществ покупки готового ПК является то, что в нем могут быть установлены такие компоненты, которые ты бы никогда не приобрел, собирая компьютер самостоятельно. Отнюдь не потому, что они плохие – просто имея определенные бюджетные рамки мы стремимся к компромиссу между производительностью и ценой, поэтому редко приобретаем новейшие или топовые комплектующие, чья стоимость оказывается несколько завышенной в силу той самой топовости или новизны

Microsoft rolls out Word patch

Microsoft has already begun offering what appears to be a patch for its popular Word software, allowing it to comply with a recent court ruling which has banned the software giant from selling copyright infringing versions of the word processing product.

Xbox 360 Thief Tracked by Gamertag

If you steal an Xbox 360, don't forget to disable the auto sign-in feature before going online. That's the lesson high-tech crooks are probably gleaning from today's New York Post brief about a thief, 22-year-old Jeremy Gilliam, apprehended after logging into Xbox LIVE with his victim's online game id.

Hackers unsuccessfully attack site

On Dec. 11, the bank’s information technology director Christine Lee met with Dells police to report that a person or persons gained unauthorized access to the bank’s domain registration. Between Dec. 5 and Dec. 7, changes made to the domain redirected customers accessing dellsbank.com or commbankportage.com to a fictitious web page. The page stated that “your account has been created” and that the person could access the Web site by going to another link

Good Guys Bring Down the Mega-D Botnet

For two years as a researcher with security company FireEye, Atif Mushtaq worked to keep Mega-D bot malware from infecting clients' networks. In the process, he learned how its controllers operated it. Last June, he began publishing his findings online. In November, he suddenly switched from de­­fense to offense. And Mega-D--a powerful, resilient botnet that had forced 250,000 PCs to do its bidding--went down.

Взломанный .NET

Думаешь .NET приложения сложны для взлома? Поверь, крекинг .NET-сборок ничуть не сложнее, а в целом значительно проще традиционных приложений. В ролике ты увидишь процесс решения одного из .NET CrackMe. На закуску продемонстрирована процедура снятия защиты с помощью шифрования.

Страница 726 из 1 610В начало...700710720724725726727728 730740750...

Еженедельный дайджест

Спасибо за подписку! Мы будем присылать важные новости ИБ в еженедельном дайджесте
Ошибка при подписке Случилась ошибка при создании подписки на наш дайджест. Пожалуйста, попробуйте позднее
Важные события и скидка на подписку:

«Хакер» в соцсетях

Материалы для подписчиков