Facebook Boosts Application Privacy Controls
Facebook has made it possible for its members to assign, on the fly, a wider variety of access levels to content they post using third-party applications and Web sites, the company said Wednesday.
Facebook has made it possible for its members to assign, on the fly, a wider variety of access levels to content they post using third-party applications and Web sites, the company said Wednesday.
A French judge has issued an arrest warrant for a cyclist accused of hacking into computer systems at an anti-doping lab.
An annual hacking contest that has made mincemeat of security on both Mac and Windows computers will set its sights on smartphones and browsers with as much as $100,000 in awards next month.
Czech security experts have uncovered a global network of devices attacked by computer viruses within which it was possible to wiretap and gain access to sensitive data, Jan Vykopal, head of the security project of Masaryk University, told CTK yesterday.
A group of over 30 national and international computer security groups on Tuesday released a list of the 25 most dangerous programming errors as part of an effort to make the custom software business more accountable.
A common Web programming error could give hackers a way to take over Google Buzz accounts, a security expert said Tuesday.
Security is a major concern all around the world and according to Kaspersky Lab, Egypt seems to be responsible for three per cent of the world’s malware creation that are intended to steal computer passwords.
The Clickatel service (a service that allows SMS sending from any number) seemed a real catch not so long ago. Everybody have just played with it but soon got tired. It's time to take the next step and figure out how to call and talk to somebody using some spontaneous number. And also try to figure out how to intercept the voice traffic, pick a password for a SIP-provider account and just make the best use of remarkable VoIP technology at the same time.
У каждого из команды ][ — свои предпочтения по части софта и утилит для пентеста. Посовещавшись, мы выяснили: выбор так разнится, что можно составить настоящий джентльменский набор из проверенных программ. На том и решили
Researchers from the University of Oxford have created a protocol for making electronic payments via mobile phones: The technology provides a secure channel that its inventors hope will be rolled into smartphone mobile banking or other payment applications.
In an attempt to stop hackers from exploiting their prized iPhone operating system, Apple has begun to ban well-known hackers of the iPhone from the iTunes App Store, according to Redmond Pie’s Taimur Asad.
Facebook users have become easy prey for criminals as more and more people share personal information on the social networking site, says a computer anti-virus company.
The Latvian government is trying to determine how hackers were able to access some 7.4 million documents containing citizens' tax data, officials said.
The government has announced a £4.5m investment to equip the Office of Fair Trading (OFT) and Trading Standards with the teams, training and technology needed to combat online scams.
A recent report by a security startup company suggests that the number of Web pages infected with malware almost doubled in the last quarter, compared with a year ago.
Four Ministry of defence officials sacked and disciplinary proceedings brought against 28 police officers for breaching rules on use of social networking sites.
Вы не поверите, но Microsoft сделала то, о чем все давно мечтали, но устали просить! Честно говоря, когда я установил Windows 7 на рабочий ноутбук, я не стал разбираться с таким новшеством, как "Библиотеки". А потом попробовал использовать их, разобрался для чего они нужны
Получить дедика одним мановением руки невозможно? Метасплойт не волшебная палочка, которая будет делать все за хакера? Чепуха это все! В правильных руках можно не только получить дедик, но и сразу много дедиков. Очень много! Смотри внимательно, и да откроется тебе черная магия автосплойта! :)
Security researchers have demonstrated a gaping security hole in Chip and PIN credit card authorisations which undermines trust in the technology as a means to verify retail purchases.
A hard-to-detect rootkit may be causing Windows XP systems to crash following Microsoft's latest security updates.
Hackers behind the new version of the Zeus/Zbot banking Trojan expressed their gratefulness to the creators of the antivirus software, Kaspersky Lab and Avira in particular. The Trojan comes with a hidden message that thanks and taunts the security vendors for ‘helping’ them improve their malware.
A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers.
За год успевает произойти многое: изобретают и выпускают новые гаджеты, открывают новые технологии, делая будущее чуточку ближе, принимают новые законы или, наоборот, протестуют против их принятия. Мировая сцена, конечно, тоже не стоит на месте — кто-то кого-то ломает, кого-то арестовывают и судят, а кто-то, тем временем, переквалифицируется в white hat'а и получает пост в крупной компании
As Valentine's Day nears, security experts are issuing warnings of fresh attacks targeting the holiday.
An upstart Trojan horse program has decided to take on its much-larger rival by stealing data and then removing the malicious program from infected computers.
As the world becomes increasingly dependent on information technology and digital communications, persistent vulnerabilities — some of which have been known for 50 years — continue to expose the world’s networks and applications to attacks.
Payroll processing firm Ceridian this week is advising more than 1,900 customer companies that a hacker managed to access the company's Internet payroll system in late December, potentially compromising the sensitive data of more than 27,000 workers.
While you're enjoying the Olympics a cyber thief could be plundering your BlackBerry or smartphone thanks to that new Bluetooth headset you just bought to comply with B.C.'s new hands-free driving laws.
Hackers have figured out a way to enable the Motorola Droid to play host to a variety of Linux-based USB devices. This means that the smartphone can directly connect and control printers, TV tuners, video cameras, and many other devices that speak Linux. The mod was created by Mike Baker of OpenWRT and Mike Kershaw from Kismet, and shared with the public by Chris Paget in this blog.
Pirates may have their illegally downloaded copy of New Super Mario Bros. Wii, however their captain has been fined $1.5 Million in damages.
iPhone users beware - an ongoing phishing campaign impersonating Apple.com, attempts to trick users into submitting sensitive device information, with the scammers in a perfect position to use the data in a countless number of fraudulent variations.
Microsoft has released the February edition of its Patch Tuesday security update. The latest release includes 13 bulletins addressing 26 vulnerabilities.
A Las Vegas software developer has been charged over a software cookie scam that left eBay severely out of pocket.
Researchers discovered a new banking trojan that is being used to steal the financial credentials of customers at approximately 15 large- and mid-size U.S. banks.
Satellites can bring a digital signal to places where the Internet seems like a miracle: off-the-grid desert solar farms, the Arctic or an aircraft carrier at sea. But in beaming data to and from the world's most remote places, satellite Internet may also offer its signal to a less benign recipient: any digital miscreant within thousands of miles.
A consortium of security and infrastructure management organisations has launched a new project to help secure Domain Name System (DNS) queries.
A Las Vegas web developer has been charged with fleecing eBay out of tens of thousands of dollars by selling a program that planted fraudulent web cookies on the PCs of people visiting the online auctioneer.
If you think that ensuring one’s Internet privacy is the only mean of the Tor software then you are wrong twice. First off, its suballocated network can be used for different purposes. And secondly, it’s not as safe as it’s painted. Alas.
Список тестируемого оборудования Методика тестирования ASUS RT-N13U ASUS RT-N16 D-Link DIR-615 D-Link DIR-655 D-Link DIR-855 NETGEAR WNR-2000 NETGEAR WNDR-3700 TRENDnet TEW-652BRP Выводы
McAfee’s latest threat report for the fourth quarter of 2009 saw a drop in spam over the period, although the year ended with overall amounts rising.