Microsoft knew of just-patched IE zero-day for months
Microsoft may not have hustled as fast as researchers thought when the company patched a zero-day bug in Internet Explorer (IE) just 18 days after exploit code went public.
Microsoft may not have hustled as fast as researchers thought when the company patched a zero-day bug in Internet Explorer (IE) just 18 days after exploit code went public.
Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit card data to be encrypted, malware that siphons clear-text information from computer memory is all the rage among scammers, security researchers say.
Internet security firm Kaspersky Lab today launched new encryption capabilities designed to provide organisations with greater protection against accidental and malicious data breach incidents.
Windows 7 is less secure out-of-the box than Vista, despite Redmond's protestations to the contrary, a top security firm has claimed.
Hackers have released software they say sabotages a suite of forensics utilities Microsoft provides for free to hundreds of law enforcement agencies across the globe.
Like its namesake Watergate, "Climategate" started with a break-in. But this one was a cyber theft.
Lawyers acting for David Kernell, the son of a Democrat Tennessee state legislator, accused of illegally breaking into the email account of Alaska governor Sarah Palin, are claiming his Acer laptop was infected with unspecified spyware in a motion filed on November 30. This may be used at his trial to show that Kernell was not personally responsible for the hack.
In another indication of the growing prevalence of fake Anti Virus scams, the FBI has released an advisory on so-called scareware.
Despite worries about the damaging effects of the digital age on brain development, surfing the internet can, in fact, increase IQ and boost memory in adults, scientists have found.
Еще одна невероятная вещь от компании Google — мобильное приложение Gogggles, которое приоткрывает для пользователей мир наложенной реальности и визуального поиска. Вы не поверите, но уже сегодня мы можем не задумываться над тем где мы или что мы видим перед собой.
Watch the video overview of the threats expected to increase during the next year and security trends to watch for in 2010. This video covers the following emerging security exploits and 2010 security predictions from Websense Security Labs:
Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet.
Trend Micro released a report titled "The Future of Threats and Threat Technologies", in which they analyzed the current situation and made some predictions for 2010 and beyond.
The House of Lords questioned two security firms today on the technical measures needed to protect nations against cyber-attacks and IT infrastructure failure.
Malware writers have revamped code that uses a popular Twitter command to generate hard-to-predict domain names, a technique that brings stealth to their drive-by exploits.
Last month, the FBI warned that hacker attacks on law firms were increasing. Specifically, the Feds noticed a rise in phishing emails with malicious attachments: just one click and the user’s computer can be exploited by the hacker.
The personal information of former, prospective, and current undergraduate students at Eastern Illinois University may have been stolen when a hacker gained access to the university's Office of Admissions server.
Adobe on Tuesday patched seven vulnerabilities in Flash Player, six of them for critical bugs that hackers could use to hijack Windows, Mac or Linux machines.
SQL injection placed No. 3 on Verizon's list of the 15 most common attacks in its data breach report. Preventing SQL injections can be the difference between data security and a screaming headline. Here are a few short tips on how to help protect your databases and applications.
Вокруг нас полно гаджетов с Linux на борту, и никто не мешает учиться на ошибках профессионалов, вскрывая гаджеты и изучая. Мной была куплена "игрушка" - книгочиталка на электронных чернилах Sony Book Reader PRS-505. Вдоволь начитавшись Хайнлайна, я полез во внутренности девайса, изучить программную и аппаратную часть
Прими участие в конкурсе компании Asus и журнала Хакер!
The multiplayer leaderboards for Modern Warfare 2 on the PlayStation Network are compromised, showing records that are impossible to achieve.
Hackbloc's HackThisZine's new edition is out (version 8.0) in beautiful full-colour glossy printable pdf or old-school text-only. HackThisZine is a technology zine written by political radicals and anarchist hackers from all across the globe.
Apple has sent a clear message to any developers who try to game its iTunes App Store. Software developer Molinker has been kicked out, along with more than 1,000 of its iPhone applications.
A Romanian hacker has posted a proof-of-concept attack exploiting vulnerabilities on the Pentagon's public Website that were first exposed several months ago and remain unfixed.
Malicious web sites and botnet activity continued to dominate the cyber securiy landscape over the past 12 months, with 10 major botnets now controlling at least five million computers, according to Symantec's MessageLabs Intelligence division.
Online crime could become more direct and aggressive in the coming months, according security experts.
Virus Bulletin (VB) conducted its latest test in November, posting the results this month. The security research company evaluated 43 antimalware products (product submission deadline was October 28) for the 32-bit version of Windows 7 Professional. The basic requirements for a product passing the test is detecting, both on demand and on access, in its default settings, all malware known to be "In the Wild" at the time of the review, and not detecting any false positives when scanning a set of clean files
Citing a rising tide of complaints from people who unknowingly bought counterfeit software infected with malware, Microsoft on Thursday announced the launch of educational initiatives and enforcement actions in over 70 countries to raise awareness of counterfeit software and to protect consumers.
Miscreants took advantage of weak security to hack into two NASA-run websites over the weekend.
A renowned security researcher has started a new service allowing companies to check the strength of their WPA-PSK encryption passwords.
Cloud computing is being held back by corporate concerns about security, according to Cisco's 2009 Annual Security Report, which found that data security and the control companies have over their information are the key factors holding back full-scale adoption of the model.
Yahoo is in a legal dispute with web site Cryptome after discovering that private information regarding services provided by Yahoo to law enforcement bodies is being made publically available online.
It was rumored long ago and now it's confirmed: The Boxee Box. Made by D-Link and bringing HDMI-support, an SD card slot, two USB 2.0 ports, WiFi, and ethernet. Anticipated release is sometime in the second quarter of 2010 with an expected price tag of $200.
After 50 years and countless dead ends, incremental progress, and modest breakthroughs, artificial intelligence researchers are asking for a do-over.
Данный ролик демонстрирует работу трояна на Apple iPhone. По команде хакера осуществляется отправка СМС, совершается звонок с телефона и выполняются системные (shell) команды.
MouseExtender — это удобная и красивая панель быстрого запуска, управлять которой можно только мышкой.
Malicious iPhone apps that Apple unwittingly approves could attack even non-jailbroken iPhones, according to a developer, but security experts say this isn't earth-shattering news.
Microsoft has reportedly introduced a plan to shuffle browser choices as part of its ongoing legal negotiations with the EU.
A security researcher has released a proof-of-concept attack that exploits critical vulnerabilities that Apple patched on Thursday. The vulns stem from bugs in the Java runtime environment that allow attackers to remotely execute malicious code. Sun Microsystems patched the flaws early last month.