Microsoft set for small Patch Tuesday
IT administrators will be relieved to hear that next week's Microsoft Patch Tuesday will see just one bulletin addressing a single vulnerability in Windows.
IT administrators will be relieved to hear that next week's Microsoft Patch Tuesday will see just one bulletin addressing a single vulnerability in Windows.
Mozilla yesterday patched 10 bugs in Firefox, half of them critical, in the browser's rendering and JavaScript engines, media and video libraries, and other components.
Facebook and Twitter use skyrocketed in 2009, and naturally the social networking sites became magnets for hacker attacks and sparked other types of privacy concerns. CIOs have expressed doubts about the social networking sites, and these stories show there is good reason to be worried. Here, in chronological order, are the top 10 security and privacy stories concerning Facebook and Twitter from the past year.
Another government Web site was found defaced Sunday night - the fifth attack since last month.
With 2009 behind us, we look forward to what the next year might bring. The question of what changes might be coming in terms of data security begs answering. The ongoing battle between hackers and the teams defending sensitive information means that the techniques in use by both sides last year will be updated, and the better you are able to predict what the other side may do, the more likely you will be prepared to defend against it
With 2009 behind us, we look forward to what the next year might bring. The question of what changes might be coming in terms of data security begs answering. The ongoing battle between hackers and the teams defending sensitive information means that the techniques in use by both sides last year will be updated, and the better you are able to predict what the other side may do, the more likely you will be prepared to defend against it
According to a warning released by security researchers, the Fox Sports website, an integral part of the Fox Broadcasting Company, has gone under the control of unknown hackers. The hackers injected malware inside the 'custom error' section of the site. Two different malicious codes have been found, each as a result of a different infection.
Одним из преимуществ покупки готового ПК является то, что в нем могут быть установлены такие компоненты, которые ты бы никогда не приобрел, собирая компьютер самостоятельно. Отнюдь не потому, что они плохие – просто имея определенные бюджетные рамки мы стремимся к компромиссу между производительностью и ценой, поэтому редко приобретаем новейшие или топовые комплектующие, чья стоимость оказывается несколько завышенной в силу той самой топовости или новизны
Microsoft has already begun offering what appears to be a patch for its popular Word software, allowing it to comply with a recent court ruling which has banned the software giant from selling copyright infringing versions of the word processing product.
Cryptographers have moved closer to their goal of eavesdropping on cellphone conversations after cracking the secret code used to prevent the interception of radio signals as they travel between handsets and mobile operators' base stations.
If you steal an Xbox 360, don't forget to disable the auto sign-in feature before going online. That's the lesson high-tech crooks are probably gleaning from today's New York Post brief about a thief, 22-year-old Jeremy Gilliam, apprehended after logging into Xbox LIVE with his victim's online game id.
On Dec. 11, the bank’s information technology director Christine Lee met with Dells police to report that a person or persons gained unauthorized access to the bank’s domain registration. Between Dec. 5 and Dec. 7, changes made to the domain redirected customers accessing dellsbank.com or commbankportage.com to a fictitious web page. The page stated that “your account has been created” and that the person could access the Web site by going to another link
For two years as a researcher with security company FireEye, Atif Mushtaq worked to keep Mega-D bot malware from infecting clients' networks. In the process, he learned how its controllers operated it. Last June, he began publishing his findings online. In November, he suddenly switched from defense to offense. And Mega-D--a powerful, resilient botnet that had forced 250,000 PCs to do its bidding--went down.
Думаешь .NET приложения сложны для взлома? Поверь, крекинг .NET-сборок ничуть не сложнее, а в целом значительно проще традиционных приложений. В ролике ты увидишь процесс решения одного из .NET CrackMe. На закуску продемонстрирована процедура снятия защиты с помощью шифрования.
Internet users in Northern California were unable to reach properties including Amazon.com and Amazon Web Services for a time Wednesday evening, as their DNS provider was targeted by a distributed denial-of-service attack. The attack came as North American consumers rushed to finish online shopping ahead of the end-of-year holiday season.
As e-readers such as the Amazon Kindle continue to rise, so follows the publishing industry's worst nightmare: e-book piracy. For years e-book piracy was the exclusive province of the determined few willing to ferret out mostly nerdy textbook titles from the Internet's dark alleys and read them on their PC. But publishers say that the problem is ballooning as e-readers grow in popularity and the appetite for mainstream e-books grows.
Security experts are warning of a highly critical new zero day vulnerability in Microsoft’s popular Internet Information Services (IIS) web server product which could allow hackers to bypass existing security measures and upload malicious code to any affected machine.
The investigation into the so-called Warmergate emails - the leaked data from the University of East Anglia’s climate change department - took a new twist last night when The Mail on Sunday tracked the stolen messages to a suspect computer which provides internet access to China.
A Chinese court announced imprisonment of up to three years to 11 persons on December 16, 2009 for their alleged role in the creation and distribution of computer virus that had the capability of stealing usernames and passwords of online games.
21-year-old Mormon college student from Nauvoo has shut out scores of other gifted computer hackers to win the U.S. Cyber Challenge.
Watching the feeds, one’s can often face the news that another Twitter account of some Britney Spears, John McCain and others of that ilk was hacked. Typically, these hacks do not make much effort and are hacked using “brute force” (stars like to set some simple passwords). But brute force – is not our method. British comedian, "The Hitchhiker's Guide to the Galaxy" and "V - for Vendetta" film star, Stephen Fry, can be taken as an example
Откуда берутся сплоиты? Задумывался ли ты, каким образом тусклая новость из багтрака превращается в реально работающую отмычку? Каким образом двумя десяткам строчек кода удается получить шелл на удаленном сервере? Сегодня мы посетим фабрику сплоитов и во всех подробностях посмотрим, как изготавливается качественное изделие.
A Twitter-style service offered by a government-linked news site in China was hacked and has since gone offline, according to screenshots posted on the Web.
Hackers have exploited flaws in a popular open-source advertising software to place malicious code on advertisements on several popular Web sites over the past week.
A former Massachusetts prison inmate has been given an 18-month prison sentence for hacking prison computers while he was incarcerated.
A San Francisco startup plans to release software for the five major smart-phone operating systems to protect data, detect malicious software and allow remote backups.
Security experts are warning that hackers are now using Microsoft’s Live Spaces blogging platform in order to push up the popularity of fraudulent online pharmaceutical sites in a strategy known as search engine poisoning.
With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has been a dynamic year for the IT security and compliance world.
The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers.
The Chinese Ministry of Industry and Information Technology (MIIT) has issued new internet regulations which could mean that many overseas web sites will be unavailable to Chinese readers.
Do you enjoy dominating your house like the Trinity killer on Dexter, knowing exactly what each of your family members are doing at all times? Then Swann has the four camera security system for you.
U.S. authorities are investigating the theft of an estimated tens of millions of dollars from Citibank by hackers partly using Russian software tailored for the attack, according to a news report.
A security researcher has identified more than 8 million Adobe Flash files that make the websites hosting them vulnerable to attacks that target visitors with malicious code.
An Israeli hacker says he has broken copyright protections built in to Amazon's Kindle for PC, a feat that allows ebooks stored on the application to work with other devices.
Однако случилось так, что точка общественного интереса куда-то переместилась или просто исчезла. Компьютер стал подобен телевизору или даже электролампочке. Тоже — чудесам прошлого. Кстати, плохо понимаю, куда завтра переместится этот пик, этот фокус
A federal appeals court on Tuesday upheld a $290 million judgment against Microsoft Corp.
На своем опыте все успели убедиться в том, что антивирус не обеспечивает абсолютной защиты. Пока вирус не попадет в руки специалистов, не будет изучен и не появится сгенерированная под него сигнатура, система остается полностью беззащитной перед новыми угрозами
Телефоны на базе Linux’а мы видели не раз. Но выход смартфона на новенькой Meamo 5, по сути, являющейся Debian’ом, да еще и на машинке с характеристиками, сравнимыми с компьютером, мы пропустить не могли. А потому решили посмотреть, на что же способен этот мобильный линукс и нужен ли он вообще?
By recommending that users exclude some file extensions and folders from antivirus scans, Microsoft may put users at risk, a security company said today.
Twitter's login credentials were used to make DNS changes that redirected surfers to a protest site last Friday, according to site admins.