Reader exploit prompts Adobe update alert
Users of Adobe PDF Reader should check they are running the latest version of the software after the discovery of an exploit that takes advantage of a serious flaw patched only three weeks ago.
Users of Adobe PDF Reader should check they are running the latest version of the software after the discovery of an exploit that takes advantage of a serious flaw patched only three weeks ago.
A Colorado man has been charged with trying to sabotage a U.S. security database that holds sensitive information used for screening air travelers, the Justice Department said on Wednesday.
Police have detained 23 suspects in operations in 13 provinces, charging them with membership in a terror organization and attacking public institutions’ Web sites, the daily Radikal reported Wednesday.
Twitter is finally being proactive about the large number of phishing scams that have plagued the micro-blogging service in the past year. On Wednesday, Twitter introduced its own anti-phishing service designed to protect its users from these types of attacks. The new security measures will focus on Twitter direct messages (DMs) -- private tweets addressed to a specific user -- and corresponding e-mail notifications
Internet service providers linked to the notorious Zeus botnet have been taken down, knocking out a third of the command-and-control servers that run the network of hacked machines.
Хороший админ не должен быть заметен. После того, как все настроено, он может спокойно заниматься своими делами, например, резаться в кваку или писать статьи в Х. Его работа оценивается по стабильно работающему серверу и отсутствию жалоб со стороны пользователей
Twitter has announced that it is to start scanning all tweets for links to sites which may cause harm to its users.
Microsoft on Tuesday warned that hackers are targeting a freshly-uncovered weakness in some earlier versions of its Internet Explorer (IE) Web browser software.
Popular P2P file sharing service Limeware has enlisted the help of anti-virus outfit AVG to offer its Pro users with free file scanning.
Since 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device's power supply
A little knowledge and a few thousand dollars is all it takes to build a fully functional botnet, according to security experts.
There are many Linux distributions readily available. This however should not stop you creating your own version of a UNIX forensic tools disc. Whether you are on Solaris, HP-UX or any other variety of UNIX it is simple to create a forensic tools CD that can go between systems. The added benefit of this method is that the tools do not need to be left on the production server. This in itself could be a security risk and the ability to unmount the CD and take it with you increases security.
Основная цель HIPS (Host Intrusion Prevention System, система отражения локальных угроз) - идентифицировать и блокировать вредоносные действия в системе и не допустить ее заражения. Отслеживаются все потенциально опасные операции, такие как работа с реестром (в первую очередь с ветками, отвечающими за автозапуск), файлами и каталогами, запуск/останов программ/служб, манипулирование потоками, контролируются инжекты в другие процессы и целостность системных файлов
Нет, это не очередной скриншот Windows 7. Это скриншот системы, которая уже не поддерживается, но является самой популярной в мире — Windows XP. А программа, которая так изменяет интерфейс, называется ViGlance.
Automobile giant Ford Motor this year will debut vehicles with built-in WiFi -- along with enhanced security features to prevent data breaches via its new cars.
Intel has said it is investigating a case of fake i7 processors being sold to businesses and consumers.
A criminal court in Thailand has approved the extradition to the US of a Malaysian man suspected of participating in credit card thefts of more than $152m, according to a local news report.
Ubisoft has confirmed its rights management servers were hit by a fierce DDoS attack over the weekend that left some customers unable to play its games for much of Sunday.
It would appear as if Energizer has found themselves in between a rock and a hard place. The famous battery maker’s Duo charger software infects an end user’s computer with a Trojan Horse malware infection, granting hackers full access to your computer, according to the United States Computer Emergency Readiness Team (US-CERT).
Ongoing computer scams targeting small businesses cost U.S. companies US$25 million in the third quarter of 2009, according to the U.S. Federal Deposit Insurance Corporation.
Latest security update addresses multiple flaws in Apache HTTP Web Server, addressing vulnerabilities such as the SSL threat TLS renegotiation threat.
If evidence is presented that attacks on Google originated in China, authorities there said they will punish those responsible.
Today one of our colleagues received a brand new Vodafone HTC Magic with Google’s Android OS. “Neat” she said. Vodafone distributes this phone to its userbase in some European countries and it seems affordable as you can get it for 0€ or 1€ under certain conditions.
Прими участие в конкурсе компании Jetbalance и сайта Хакер!
Социальные сети внезапно стали очень популярны. Сейчас социальная сеть – это и способ пообщаться, и найти друзей, а для кого-то – заработать деньги. И нет ничего удивительного, что каждый захотел создать свою соцсеть. Как раз для этого был написан простой, удобный (и, как позже выяснилось, изобилующий уязвимостями) движок
Secretary of the Department for Homeland Security (DHS) Janet Napolitano has announced a new initiative to educate the public and private sector about the need for cybersecurity.
Standard operating procedure for the identity theft industry involves performing high-volume fraudulent transactions as quickly and quietly as possible. But now researchers have found evidence of a new hacking group that takes a different approach--one that's less discreet and more destructive.
More and more personal, private information is being used and stored online than ever before, and at the same time, attacks on that information are increasing in frequency and sophistication. Phishing is a growth industry—it's very profitable to trick people into handing over names, passwords, credit card numbers, and so on, so that their finances can be pillaged. Important activities like banking and filing tax returns are being performed, and these need strong proof of identity
First, Google reported that it, along with a bunch of other major companies, had been hacked, and pointed the finger at China.
The Dutch police and intelligence services tapped at least 3350 internet connections in 2009. An increase of 385 percent since 2006.
North Korea's self-developed software operating system named the "Red Star" was brought to light for the first time by a Russian satellite broadcaster yesterday.
24 марта начнется Pwn2Own 2010 - знаменитый конкурс "взломщиков", традиционно проводимый в рамках конференции по безопасности CansecWest в Ванкувере. Каждый год солидные денежные призы присуждаются тем, кто смог воспользоваться "дырками" и программными ошибками в браузерах и ОС, а также в софте для популярных мобильных устройств, таких как iPhone.
Привет, коллега! Сегодня мы поговорим о таком важном компоненте Windows как диспетчер кэша. Узнав теорию и попробовав практику, ты можешь свернуть горы, поверь мне. Нужно лишь знать азы отладки, а остальное освоим вместе.
M86 Security released a new report revealing its Security Labs research results based on the primary attack vectors on the Web and how the common approaches used to fend off these attacks stand up in today’s dynamic threat landscape.
While Google called a cyber-attack against its network last January a "highly sophisticated and targeted attack," security experts said the techniques show the attackers to be nothing more than "amateurs."
BlackBerry has gained a reputation in the mobile space during the past decade or so as the "most secure" handheld device and mobile platform available. That's largely due to RIM's BlackBerry Enterprise Server (BES) software for corporate e-mail deployments, which has earned high-level security certifications from some of the world's most demanding information-security organizations, including the U.S
The Obama administration on Tuesday declassified part of its plan for making cyberspace more secure, a move meant to foster greater co-operation between government and civilian groups in an area of increasing urgency.
The biggest threat to the open internet is not Chinese government hackers or greedy anti-net-neutrality ISPs, it’s Michael McConnell, the former director of national intelligence.
How will we ever get a leg up on hackers who are infecting computers worldwide? Microsoft's security chief laid out several suggestions Tuesday, including a possible Internet usage tax to pay for the inspection and quarantine of machines. Today most hacked PCs run Microsoft's Windows operating system, and the company has invested millions in trying to fight the problem.
Software giant Microsoft Corp has won a U.S. court approval to deactivate a global network of computers that the company accused of spreading spam and harmful computer codes, the Wall Street Journal said.