MS discovers flaw in Google plug-in for IE
Microsoft has helped discover a flaw in the Google Chome Frame plug-in for Internet Explorer users.
Microsoft has helped discover a flaw in the Google Chome Frame plug-in for Internet Explorer users.
The failure of corporate chiefs to make security a priority and a reactive approach to data protection has left many companies vulnerable to attack, especially via emerging technologies such as smart phones and cloud computing, according to a survey of information technologists. published on Tuesday.
Snow Leopard users are once again free to run the Apple operating system on hardware with Atom processors, courtesy of hackers in Russia.
An exploit for Internet Explorer was published online yesterday, showing signs of poor reliability. Symantec confirmed that the exploit affects Internet Explorer 6 and 7. Experts believe a fully functional version of the exploit will be made available in the coming weeks.
Three hackers have been charged by federal indictment over their alleged involvement in infiltrating the security of Comcast.net and subsequently redirecting the visitors of the website to web pages under their control a year back.
A team of unidentified hackers has managed to steal "confidential" global warming data after breaking into the e-mail server of a prominent, British climate-research center and posted them online - showing that climate scientists conspired to overstate that man has caused climate change.
A new form of attack that installs a rootkit directly onto a computer's Bios system would render anti-virus software useless, researchers have warned.
A Dutch internet service provider has identified a worm that installs a backdoor on jailbroken iPhones and makes them part of a botnet.
Герои 3D Max, Maya, Cinema и прочих графический 3D-студий в конце концов перестают удовлетворяться создавая и оживляя созданных персонажей анимацией. Хочется с ними что-то сделать – красивое демо, базовую игру, что угодно, только бы вытащить свои творения за пределы 3D-редактора
The Security Response team has compiled the top security trends of 2009. We pulled data from the Global Intelligence Network and the experiences of the thousands of analysts and security experts at Symantec to come up with the top trends for the year. While none of these trends will be a surprise to anyone even casually following the threat landscape, when compiled and summarized, it is clear that the breadth of security problems in the past year was pretty stunning.
The soon-to-be shipped version 3.6 of the Firefox browser will have a new feature that will make it more stable. It is called Component Directory Lockdown, and it prevents third-party applications (add-ons and plugins) to store their own code into the "components" directory, where most of Firefox's own code is stored.
Penetration testing, once considered a risky practice for the enterprise and even a tool for evil hacking purposes, is becoming more of an accepted mainstream process in the enterprise mainly due to compliance requirements, more automated, user-friendly tools -- and most recently, the imminent arrival of a commercial offering based on the popular open-source Metasploit tool.
T-Mobile U.K. said Wednesday that an employee was to blame for stealing possibly millions of customer records and selling the data to competitors.
BlackBerry and smartphone security in general hasn't garnered much attention or concern over the past few year, at least from a consumer, or user, perspective. Enterprises have been invested in mobile device security since the advent of the PDA.
Hackers broke into the website of Latvia's President Valdis Zatlers on Wednesday, leaving a message urging the head of state to save the recession-afflicted Baltic state, his office said.
Second-hand ATM machines containing sensitive transaction data are easily available for purchase on eBay or even Craiglist, according to an investigation by a US-based security consultant.
The National Security Agency helped Microsoft harden Windows 7 against attacks and is providing similar assistance to Apple, Sun Microsystems and Red Hat too, an agency official said.
Viruses and malware are words not normally linked to video games, that is until you talk to Michael Helander, VP of Sales and Marketing at Lavasoft. His software company has developed a new product, Ad-Aware Game Edition, that's designed to protect online gamers from viruses, a problem that's "increased over 600% in the last year," according to their website.
Quantum processing units are fundamentally different in a number of ways. First, where a regular bit can be only 1 or 0, a quantum bit (or qubit) only assumes a value of 1 or 0 when it is observed. Additionally, Quantum computers aren’t bound by Boolean operators like ‘and, ‘or’ and ‘not’. Finally, two qubits can be “entangled”, meaning they will always have the same value when observed, even if separated.
Federal officials have put the PS3 to work breaking passwords on computer equipment confiscated from suspected child pornographers, according to a story released on the Scripps Howard Foundation wire.
Не так давно наше "Управление "К" обнаружило "подозрительную активность китайских хакеров", о чем не преминуло нам всем сообщить. Мне, конечно, радостно от того, что на страже наших с вами компьютеров кто-то как бы стоит, но после прочтения статьи напрашивается естественный вопрос: а дальше-то что? Неужели захлопнутся за "китайскими хакерами" ворота русского СИЗО? Неужели никто не будет больше грозить ботнетами нашим южным границам?
Важная часть любого пентеста - сбор данных об удаленной системе. Более того, именно с разведки и начинается атака на удаленный хост. Чем больше известно о виртуальном противнике, тем проще отыскать инструменты, чтобы отправить его в нокдаун
A New Jersey man has been charged with stealing the p2p.com domain name and selling it to a professional basketball player for more than $111,000 in the first US indictment for domain name theft.
A Romanian national has admitted he defrauded Bank of America of about $150,000 in a scheme that secretly recorded customer information as it was entered into automatic teller machines.
Start-up InZero Systems Tuesday makes its debut with a security service that promises to protect PCs from possible malware, intrusions and other types of attacks.
Good news for devotees of ponytailed crypto guru of all our hearts Bruce Schneier: it's now possible to buy an officially endorsed "Bruce Schneier action figure".
After 12 months in development, Metasploit version 3.3 is available to the masses. The new version packs in a ton of features, fixes, exploits, and payloads, thanks to contributions from the community.
Self-proclaimed anti-fascist hackers have struck a major blow at controversial World War II historian David Irving by taking down two of his websites and publishing scores of his emails and private information.
The release of Fedora 12 will mark the fourth major operating system update this fall. Codenamed 'Constantine' and like the three previous OS releases, Windows 7, Ubuntu 9.10 openSUSE 11.2, the Linux based Fedora 12 comes packed with a variety of improvements and new features.
The ability of several countries to launch politically-motivated cyber-attacks has increased and put critical infrastructure in the crosshairs, according to a sweeping report from McAfee.
Microsoft is creating technology to give businesses more fine-grained control over access to data stored in the company's upcoming SQL Azure database cloud service, a senior engineer said today. Code-named Vidalia, the technology will provide "trustworthy data collaboration for highly sensitive business data across disparate trust domains," said Microsoft technical fellow Dave Campbell in a talk at Microsoft's Professional Developers Conference 2009 (PDC09) in Los Angeles.
From the Pirate Bay blog:
Why would you want to build a 100-strong swarm of mini robots? Well, aside from having them as your minions, you might be able to learn about "artificial self-organization," and "control in large robotic groups," which should come in useful during the inevitable robot insurrection. The swarm robot project, undertaken by the Universities of Stuttgart and Karlsruhe in Germany, aims to produce mini drones that can communicate with one another to avoid collisions, while keeping to a volume of less than three centimeters cubed
Сам я пользовался разными средствами резервного копирования, от простых, вроде стандартного backup Windows, до корпоративных. Как пользователя меня естественно подкупила "Машина времени" от Apple. Но я знаю и то, что мне в ней не нравится
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 23 has been released today.
GlobalSignhas announced a new multi-year certificate called PersonalSign that will secure email content and the identity of the email sender.
Security giant McAfee today launched a new report urging public and private sector organisations to collaborate more effectively to ensure that critical national infrastructures are able to withstand any future cyber warfare attacks.
A British court has sentenced four men to prison after they admitted they used sophisticated trojan software to steal almost £600,000 from bank accounts and send it to Eastern Europe.
ICSA Labs says that four out of five security products it tests fail to deliver the basic functionality of their design, and that 40 percent are inherently insecure. The report says more is needed in security product quality control, but will vendors hear the message before end users are filled with doubt.
Yahoo has been praised for its quick response to a flaw in a Yahoo job site that could have left visitors vulnerable to infection.