iPhone vulnerable to remote attack on SSL
Apple's iPhone is vulnerable to exploits that allow an attacker to spoof web pages even when they're protected by the SSL, or secure sockets layer, protocol, a security researcher said.
Apple's iPhone is vulnerable to exploits that allow an attacker to spoof web pages even when they're protected by the SSL, or secure sockets layer, protocol, a security researcher said.
iDefense is warning users of several critical vulnerabilities in several versions of its online media application, RealPlayer, that could open the door for a remote code execution attack on both Windows and Mac systems, according to iDefense Labs security blog.
They go by names such as Piratecrackers, Yourhackers and Slickhackerz. Although illegal, a handful of internet services brazenly advertise that for a usual hundred dollar fee they can obtain almost any email password. One site boasts that it provides an ideal way to catch a cheating spouse or significant other.
A mysterious flood of SSL packets from the Pushdo botnet, possibly an attempted DDOS attack, is not succeeding, according to the Internet Storm Center. None of the attacked sites are experiencing significant outages.
Ежесекундно по интернет-каналу корпоративной сети проходят тысячи пакетов. Часть из них нацелена на то, чтобы обойти все заслоны и нарушить работу сетевых сервисов или предоставить их автору базу для рассылки спама. И здесь на помощь администратору приходят системы обнаружения атак, позволяющие вовремя среагировать на угрозу
Представь, что ты администратор Сети и в руках твоих Nokia N900, основанный на MAEMO. Ты весь в делах и разъездах и твой мобильный компьютер - единственная связь с твоей подведомственной локалкой и внешними сетями. Рулить ими надо всерьез и надолго - конечно при помощи N900
A new Website launched today called Security Scoreboard includes information on more than 600 security vendors and their products, as well as customer reviews. The site is aimed at CISOs, CIOs, and others looking for a one-stop shop to find security product and services information.
Five months after Ameriprise Financial fixed a bug that could have helped criminals steal user authentication credentials, the financial giant's website is vulnerable again.
Microsoft's Internet Explorer 8 (IE8) became the world's most popular browser during January, gaining 22.31 per cent of the market and overtaking IE6 for the first time.
Adobe's Flash technology has been the target of security researchers for several years, though often it's the Flash Player that gets the bulk of the attention. Mike Bailey, a senior security analyst with Foreground Security, is now turning the focus to how common programming bugs can enable Flash objects to attack Web sites.
As more organizations allow employees to use social media like Facebook and Twitter at work, cybercrime attacks on these networks have exploded, according to a report released Monday by IT security firm Sophos. Reports of malware and spam rose 70 percent on social networks in the last 12 months, the security survey reveals.
Matthew Delorey was a 26-year old with a business plan: selling hacked cable modems. This is the sort of business that a budding entrepreneur should probably keep on the down-low, or at least limit to those tiny text ads at the back of magazines where satellite descramblers are sold, but that's no way to rake in the cash.
Hackers calling themselves the Iranian Cyber Army hijacked the website of a Dutch-based Persian language radio station at the weekend, weeks after doing the same to China's Baidu Inc search engine and Twitter.com.
International Telcommunications Union secretary general Hamadoun Toure has called for a treaty to avert possible cyber war at the World Economic Forum. During a debate on when a cyber attack becomes a declaration of war, Toure called for a treating that would bind nations to not launch the first cyber attack.
For the right price, you can now buy a Twitter account user name and password. Researchers at Kaspersky Labs claim that hackers are attempting to sell compromised Twitter accounts for up to $1,000.
A highly sophisticated hacking operation that led to the leaking of hundreds of "climategate" emails from the Climatic Research Unit in East Anglia was probably done by a foreign intelligence agency, says the British Government's former chief scientist.
BitTorrent has plenty of practical and legal uses, but sadly, if you're one of the millions of people using it, you're probably breaking the law. A student at Princeton University by the name of Sauhard Sahi has conducted a study of more than 1,000 random files acquired using the trackerless Mainline DHT, and found that more than 99% of them infringe on copyrights. I somehow doubt this news will shock or amaze you, but at least one interesting discovery was made and it makes a pretty compelling argument against those who would try to claim that DRM helps prevent piracy.
Все мы пользуемся каким-то перечнем привычных программ, но рано или поздно привычные инструменты становятся хуже — перегруженные функционалом, медлительные, глючные или просто за новую версию опять просят денег. Так мы приходим к вопросу: а что есть еще такого как моя программа, но лучше?
Приветствую тебя, уважаемый почитатель буржуйского бойс-бенда Backstreet Boys! Сегодня я расскажу занимательную историю о том, как быстро и без боя сдались backstreetboys.com, myspace.com/backstreetboys, а также twitter.com/backstreetboys - основные сетевые ресурсы твоей любимой группы
The Central Intelligence Agency, PayPal, and hundreds of other organizations are under an unexplained assault that's bombarding their websites with millions of compute-intensive requests.
Underscoring a little-known web vulnerability, hackers are exploiting a weakness in the Mozilla Firefox browser to wreak havoc on Freenode and other networks that cater to users of internet relay chat.
A hacker broke into 49 House websites and defaced the front pages with obscene comments about President Obama.
Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
Graham Cluley, senior technology consultant at Sophos, explained that users of the social networking site are reacting to a mystery application that may or may not be spying on them.
Apple's new iPad device looks like it will have some of the same security issues that affect the iPhone, such as weak encryption, a mobile security expert said on Thursday.
In designing Chromium, we've been working hard to make the browser as secure as possible. We've made strong improvements with the integrated sandboxing and our up-to-date user base. We're always looking to stay on top of the latest browser security features. We've also worked closely with the broader security community to get independent scrutiny and to quickly fix bugs that have been reported.
"У кого есть инвайт на Google Wave?" — самая частая просьба на форумах и в блогах. Каждый хочет попробовать, каждый хочет оценить. Но так ли крут сервис, насколько желанным он стал для огромного числа пользователей? В этом мы и решили разобраться, собрав ответы на самые частые вопросы.
Совсем недавно мы тестировали топовый NAS от NETGEAR – ReadyNAS Pro. По скоростным результатам он оказался рекордсменом, но его непомерно высокая стоимость (даже в варианте без дисков) может отпугнуть и "богатенького буратино"
A total of 5.5 million Web pages on more than 560,000 Websites were infected in the fourth quarter, according to new data, with evidence that attackers are waging less noticeable exploits in order to remain under the radar.
Russian hackers get a “gold medal” for fraud, but their Chinese counterparts carried out more than half of all the cybercrimes committed last year, according to Kaspersky Lab, Russia’s largest antivirus software developer.
A Nebraska man is expected to plead guilty next week to launching a cyber attack that shut down the Church of Scientology's Web sites, federal prosecutors said Monday.
Five Web sites run by Chinese human rights activists were attacked by hackers over the weekend, as a separate row continued between Google and China over political cyberattacks.
The administrators of the Tor anonymiser network are urging users to upgrade their software in the wake of a security breach. A total of three servers belonging to the network were compromised in an attack by unidentified hackers who proceeded to use the machines as a base to launch other attacks. The affected servers have since been "refurnished," according to the team.
Google has announced version 4.0 of its browser Chrome. Available for Windows only, it fixes 13 bugs and improves synchronization of extensions.
The hackers who infiltrated the computer systems of Google earlier this month first carried out sophisticated reconnaisance and may even have posed as friends of Google employees, according to McAfee chief technology officer George Kurtz.
Computer scientists in Britain have uncovered weaknesses in electronic passports issued by the US, UK, and some 50 other countries that allow attackers to trace the movements of individuals as they enter or exit buildings.
A Texas bank is suing a customer hit by an $800,000 cybertheft incident in a case that could test the extent to which customers should be held responsible for protecting their online accounts from compromises.
A conservative activist who posed as a pimp to target the community-organizing group ACORN and the son of a federal prosecutor were among four people arrested by the FBI and accused of trying to interfere with phones at Louisiana Sen. Mary Landrieu's office.
Зима набирает обороты, на улице становится крайне холодно и совсем не комфортно. Сбегая от мороза, мы прячемся в оазис тепла – любимый дом. Но, придя домой, нужно уметь правильно согреться. Оказывается и здесь есть несколько нюансов.
В Декабре прошлого года мы разыгрывали процессор AMD Phenom II X4 965 Black Edition от компании OLDI Computers, спрашивая вас о рекордах и инновациях компании AMD. В общей сложности мы получили более 200 ответов и победителем решили признать Клишева Игоря Борисовича, который написал следующее: