RockYou password snafu exposes webmail accounts
Millions of user passwords to social networking sites have been exposed, after a serious SQL injection flaw on the Rockyou.com website left login details - stored in plain text - up for grabs.
Millions of user passwords to social networking sites have been exposed, after a serious SQL injection flaw on the Rockyou.com website left login details - stored in plain text - up for grabs.
The international hacker who has admitted to stealing more than 130 million payment card numbers has mounted a new defense claim that he might suffer from Asperger's syndrome, a court filing indicates.
The FBI has accused a man of copyright infringement for allegedly uploading to the Web the feature film "X-Men Origins: Wolverine" last spring.
Conficker may be under control, but the malicious family of programs is resident on more than 6.5 million computers worldwide, with more than 5 percent of some network's Internet addresses showing signs of infection.
Users should disable JavaScript in Adobe's Reader and Acrobat tools to protect themselves until a patch for a just-disclosed vulnerability is available, security experts said today.
Malware purveyors are exploiting web vulnerabilities in appleinsider.com, lawyer.com, news.com.au and a dozen other sites to foist rogue anti-virus on unsuspecting netizens.
Public fascination with television's "CSI" forensic detectives and with the virtual reality depicted in the "Matrix" films may be partly responsible for the high level of interest garnered by a Defense Department contest to solve cyber crimes.
As 2009 draws to a close and a new decade dawns, CSOonline has reached out to some of the industry's best known security pros in search of insight on what the next 12 months and beyond have in store for our IT and cyber infrastructure. Each participant was asked to make five predictions.
Research carried out by Bell Micro, the IT systems distributor, claims to show that 67% of organisations believe there is a greater threat to their IT systems security and integrity from within their organisation than from hackers outside.
Cybercriminals are lazy. Given the choice between adapting their malicious software to a new operating system or focusing on users who haven't made the switch, they'll inevitably choose the path of least resistance, according to a new report from Finnish security firm F-Secure.
In a newly released report, security researcher claims that Google’s reCAPTCHA, one of the most widely adopted free CAPTCHA services, contains weaknesses that would allow a 10,000 infected hosts botnet the ability to achieve 10 recognition successes every second, allowing it to register 864,000 new accounts per day.
Rest assured that 2010 is going to be a big year for the Android operating system, with many new handsets finding their way to stores around the world (including Google’s own phone) and an increasing number of developers building tools, games and the likes for the fast-growing platform.
According to web analytics company Net Applications, Chrome marketshare leaped to 4.4 percent last week, based on the analysis of 160 million unique visitors to 40,000 sites. Meanwhile, Safari only held 4.37 percent of the market. A narrow victory? Sure. But a victory the nonce.
A damaged Telstra cable under Melbourne airport brought down the airline's telecommunications service provider, crippling its passenger check-in process from lunchtime yesterday and forcing the cancellation of 48 flights.
Если ты считаешь, что Tor - это исключительно средство для обеспечения приватности в сети, то ты неправ дважды. Во-первых, его распределенную сеть можно использовать в разных целях. А, во-вторых, не так уж безопасен черт, как его малюют
Когда вам говорят об опасностях длительной работы за компьютером, какие риски чаще всего вспоминают? Испортишь глаза! Будет болеть спина! Все это верно, но риски для глаз практически сведены "на нет" хорошим монитором, а спина любит спортзал и хорошее кресло
Any break-in pursues its own aim, which determines its value. It's up to you to decide whether to deface a site for the latent risqué things lovers or to screw up another root shell. The reality is that any vulnerability in a web application poses a threat to the server. And if you don't confine yourself to the trite and somewhat boring SQL injections so this article is right for you. The victim's address is at input, the admin access via RDP is at output – these are classics of penetration!
The anti-spam community is unlikely to have any future successes on the same scale of the McColo shutdown, as botnet herders have learned from their mistakes to make botnets harder to track and close, according to McAfee.
A bug in the latest version of the Google Chrome browser could leak the identity of users trying to surf anonymously, developers warn.
Koobface - the long-running worm which first appeared 12 months ago - is being customised by hackers to crack security systems on website hosting services, and so allow it to auto-create its own web pages.
A team of hackers has successfully rooted the recently released Nook e-reader.
The United States and Russia have begun discussions on increasing security online. The two sides are also said to be working for an agreement to cut the number of online military attacks.
Online attacks against databases have taken off in the past 18 months, according to data released by IBM’s X-Force security team.
A new scareware package tries to sell bogus antivirus software to its victims using an apparent endorsement of the software by Microsoft.
Dr.Web Enterprise Suite предназначен для централизованного управления защитой рабочих станций корпоративной сети под управлением Windows 9x-Vista. В этом ролике мы установим компоненты данного решения и познакомимся с основными настройками консоли администрирования.
First the iPhone, now the Droid: A hacker has unleashed an exploit that lets a user wrest administrative root control of his or her Motorola Droid smartphone.
Microsoft may not have hustled as fast as researchers thought when the company patched a zero-day bug in Internet Explorer (IE) just 18 days after exploit code went public.
Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit card data to be encrypted, malware that siphons clear-text information from computer memory is all the rage among scammers, security researchers say.
Internet security firm Kaspersky Lab today launched new encryption capabilities designed to provide organisations with greater protection against accidental and malicious data breach incidents.
Windows 7 is less secure out-of-the box than Vista, despite Redmond's protestations to the contrary, a top security firm has claimed.
Hackers have released software they say sabotages a suite of forensics utilities Microsoft provides for free to hundreds of law enforcement agencies across the globe.
Like its namesake Watergate, "Climategate" started with a break-in. But this one was a cyber theft.
Lawyers acting for David Kernell, the son of a Democrat Tennessee state legislator, accused of illegally breaking into the email account of Alaska governor Sarah Palin, are claiming his Acer laptop was infected with unspecified spyware in a motion filed on November 30. This may be used at his trial to show that Kernell was not personally responsible for the hack.
In another indication of the growing prevalence of fake Anti Virus scams, the FBI has released an advisory on so-called scareware.
Despite worries about the damaging effects of the digital age on brain development, surfing the internet can, in fact, increase IQ and boost memory in adults, scientists have found.
Еще одна невероятная вещь от компании Google — мобильное приложение Gogggles, которое приоткрывает для пользователей мир наложенной реальности и визуального поиска. Вы не поверите, но уже сегодня мы можем не задумываться над тем где мы или что мы видим перед собой.
Watch the video overview of the threats expected to increase during the next year and security trends to watch for in 2010. This video covers the following emerging security exploits and 2010 security predictions from Websense Security Labs:
Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet.
Trend Micro released a report titled "The Future of Threats and Threat Technologies", in which they analyzed the current situation and made some predictions for 2010 and beyond.
The House of Lords questioned two security firms today on the technical measures needed to protect nations against cyber-attacks and IT infrastructure failure.