ISPs expected to adopt new security code of practice
The local ISP industry is expected to take up the Australian Internet Industry's (AII) new voluntary code of practice on cyber security, but some doubts over the plan have been expressed.
The local ISP industry is expected to take up the Australian Internet Industry's (AII) new voluntary code of practice on cyber security, but some doubts over the plan have been expressed.
Two security researchers have claimed there is a major security flaw in the way Windows 7 interacts with the hardware of its host machine. They argue it could be extremely difficult to fix the issue.
More than a quarter of the security products submitted for the recent Windows Server 2008 R2 Virus Bulletin VB100 anti-malware tests failed to pass.
An analysis being presented this week says open source software is exploited faster and more effectively than proprietary solutions.
Unauthorized users penetrate Pentagon networks over six million times a day, says the head of the US Cyber Command, urging US military to guard against cyber attacks.
The Glorious People's Republic of China is facing a wave of hack attacks from inside its own bamboo curtain.
Researchers have released software that exposes private information and executes arbitrary code on sensitive websites by exploiting weaknesses in a widely used web development technology.
Ровно три года назад один из коллег спросил: "Ребята, я хочу определять в любое время местонахождение моей машины. Например, зайти на сайт и увидеть, где находится автомобиль на карте Москвы. Какие есть простые, надежные и недорогие решения?" В то время о недорогих устройствах оставалось только мечтать
Периодически в интернете можно встретить настолько ценные статьи, что хочется распечатать их и зачитать до дыр. При этом не на всех сервисах предусмотрена версия статьи для печати или наши желания распечатать не совпадают с предоставляемыми возможностями (хочется оставить картинку или изменить тип основного шрифта)
Обеспечение правильной и бесперебойной работы почтового сервиса является одной из приоритетных задач администратора. Можно спорить до хрипоты, что свободные сервера лучше, но факт остается фактом - Exchange Server пользуется большой популярностью среди многих компаний, благодаря надежности работы, тесной интеграции с Active Directory и планирующим особенностям
E-commerce company Digital River exposed data belonging to almost 200,000 individuals after hackers executed a “highly unusual search command” against its secured servers, according to a news report.
I’m as sick of writing about it as you are sick of reading about it. But because Facebook has become a societal juggernaut: a massive inexorable force that seems to crush everything in its way, we need to discuss it because it’s messing with lots of functions of society.
The ability to access the code of open-source applications may give attackers an edge in developing exploits for the software, according to a paper analyzing two years' worth of attack data.
Local police here have arrested a seven-member gang in Hyderabad for allegedly hacking the website of the Regional Passport Office.
Social engineering has evidently earned a new level of respect from hacker community: For the first time, this year's Defcon gathering in Las Vegas will feature a contest in which participants will compete to gather nuggets of information from unsuspecting target companies -- over the telephone instead of the Internet.
The internet as we know it is reaching its limits.
The Consumers’ Foundation yesterday said a number of social gaming companies do not provide adequate protection of consumers’ rights, as they have no standard procedures to prevent hackers from illegally accessing players’ accounts.
"Malware embedded into legitimate-looking games designed for Windows Mobile has appeared, automatically dialing up foreign telephone services to rig up hundreds of dollars in illicit charges for users behind their backs," Prince McLean reports for AppleInsider.
The Israeli radio reported today that hackers hacked 1000 Israeli websites since the Israeli attack of Freedom Flotilla on last Monday.
Recent reports have detailed Google's actions to phase out the internal use of Microsoft's operating system for security reasons following targeted attacks that the company has experienced. The targeted espionage attacks took place in January of this year and were carried out with the aim of gaining access to the Gmail accounts of Chinese human right activists.
Adobe has announced that an exploitable flaw in Adobe Reader 9.x, Acrobat 9.x, and Flash 9.x and 10.x has been discovered and is being actively exploited. Windows, Mac OS X, and Linux versions are all affected. The flaw allows arbitrary code execution by attackers, and hence it is deemed "critical."
Легальный взлом. Можно ли заниматься любимым делом и прокачивать свои навыки в пентесте, не нарушая закон? Где можно проводить инъекции и экспериментировать со сплоитами, не думая о том, включен VPN или нет? Как опробовать полученные знания, пробравшись от бага в скрипте до самого рута в системе? Способ есть!
Стандартный веб-интерфейс Twitter имеет определенные недостатки. Поэтому широкое распространение получили веб-клиенты и настольные приложения, делающие твиттинг по-настоящему приятным занятием.
Cyber attacks, pandemics and electromagnetic disturbances are the three top "high impact" risks to the U.S. and Canadian power-generation grids, according to a report from the North American Electric Reliability Corp. (NERC).
A shipment of Samsung’s Wave smartphones has apparently shipped with malware stored on the handset’s microSD card.
Hoping to understand what a new generation of mobile malware could resemble, security researchers will demonstrate a malicious "rootkit" program they've written for Google's Android phone next month at the Defcon hacking conference in Las Vegas.
World Cup fever is almost upon us and, with England's World Cup squad due to be announced today, it looks like hackers and criminal gangs will be generating large volumes of infected and other malicious email with a football theme.
Adobe's Photoshop Creative Suite 4 image-editing software has critical vulnerabilities that could let hackers take control of Macs with the suite installed. Graham Cluley, a security researcher, said the security risk lies in infected ASL, ABR, and GRD files that can cause you to surrender control of your Mac to a remote hacker.
At the upcoming The Next HOPE (Hackers On Planet Earth) conference organized bi-yearly by 2600: The Hacker Quarterly, the RFID badges distributed to attendees will be fully hackable, complete with open API. In a HOPE press release and video, commentary is made on how data passively collected through RFID badges can be used to explore a number of interesting questions regarding group and individual behavior; by encouraging attendees a way to access, manipulate, and interact with that data, they expect to see new ideas emerge about the capabilities and potential misuses of RFID-based technologies.
A hacking tool advertised as being capable of enabling users to hack Windows Live accounts and grab Windows Live Messenger passwords is actually used by attackers to spread their malicious code. According to BitDefencer, HackMSN.exe will not only not permit users to recover Windows Live passwords, but will instead infect them will malware, namely the Backdoor.Bifrose.AADY.
A problem that rendered as many as 10,000 U.S. military GPS receivers useless for days is a warning to safeguard a system that enemies would love to disrupt, a defense expert says.
Mac security firm Intego has issued a warning about a Mac twist on a two-year-old Windows spyware app that sends a variety of potentially sensitive information to external servers. Dubbed "OSX/OpinionSpy," the spyware is installed along with a number of widely available third-party Mac OS X screensaver modules, as well as with at least one shareware tool to strip audio tracks from Flash videos.
Взлом сайта Министерства внутренних дел Казахстана.
Этот видеоурок интересен хотя бы тем, что дает основное представление о способах антиотладки, основанных на применении механизма обработки исключений. Автор наглядно демонстрирует два эффективных способа противодействия отладчикам уровня приложения: один из методов - установка собственного обработчика исключений с последующей генерацией ошибочной ситуации - действует практически на все отладчики третьего кольца, вызывая переполнение стека
Самая большая проблема современного офисного работника в том, что он практически не способен фокусироваться на длительное время на своих задачах — постоянные нотификации почты, мессенджеров, оповещений социальных сайтов и т.д.
Oil giant BP suffered further embarrassment on Thursday after its official Twitter account was hacked.
As per the security firm, search engine results infested with links to bogus antivirus software have been a continuous problem for Internet users.
Technology firms should be wary of outsourcing manufacturing overseas en masse, says the author of an annual IT industry report.
Ryan Gavin, Microsoft's senior director of Internet Explorer, is remarkably chirpy for a man whose product's market share has plunged from 90% to roughly 60%, but it seems things are not all bad. "The future for IE is as bright as it's been any time over the past five years," he says. "IE8 is the fastest-growing browser in history: it's the number one browser on Windows, and the number one across all OSs
The CEO of a company accused of making more than $100 million selling harmful "scareware" antivirus products was already a fugitive from U.S. authorities, following his arrest in 2008 on criminal counterfeiting charges.