China outlines new web site regulations
The Chinese Ministry of Industry and Information Technology (MIIT) has issued new internet regulations which could mean that many overseas web sites will be unavailable to Chinese readers.
The Chinese Ministry of Industry and Information Technology (MIIT) has issued new internet regulations which could mean that many overseas web sites will be unavailable to Chinese readers.
Do you enjoy dominating your house like the Trinity killer on Dexter, knowing exactly what each of your family members are doing at all times? Then Swann has the four camera security system for you.
U.S. authorities are investigating the theft of an estimated tens of millions of dollars from Citibank by hackers partly using Russian software tailored for the attack, according to a news report.
A security researcher has identified more than 8 million Adobe Flash files that make the websites hosting them vulnerable to attacks that target visitors with malicious code.
An Israeli hacker says he has broken copyright protections built in to Amazon's Kindle for PC, a feat that allows ebooks stored on the application to work with other devices.
Однако случилось так, что точка общественного интереса куда-то переместилась или просто исчезла. Компьютер стал подобен телевизору или даже электролампочке. Тоже — чудесам прошлого. Кстати, плохо понимаю, куда завтра переместится этот пик, этот фокус
A federal appeals court on Tuesday upheld a $290 million judgment against Microsoft Corp.
На своем опыте все успели убедиться в том, что антивирус не обеспечивает абсолютной защиты. Пока вирус не попадет в руки специалистов, не будет изучен и не появится сгенерированная под него сигнатура, система остается полностью беззащитной перед новыми угрозами
Телефоны на базе Linux’а мы видели не раз. Но выход смартфона на новенькой Meamo 5, по сути, являющейся Debian’ом, да еще и на машинке с характеристиками, сравнимыми с компьютером, мы пропустить не могли. А потому решили посмотреть, на что же способен этот мобильный линукс и нужен ли он вообще?
By recommending that users exclude some file extensions and folders from antivirus scans, Microsoft may put users at risk, a security company said today.
Twitter's login credentials were used to make DNS changes that redirected surfers to a protest site last Friday, according to site admins.
Over the weekend, a major Typolight security hole was identified that allows hackers to bypass password authentication and gain access to Typolight sites.
Intel has released a patch for its series of silicon-based security protections after researchers from Poland identified flaws that allowed them to completely bypass the extensions.
В этом ролике ты узнаешь, как можно за пару минут поднять собственный прокси-сервер с помощью утилы Pproxy. Сначала хакер выбирает обычный веб-шелл из заначки. Затем заливаем скрипт проксика на удаленный сервер, после чего, запускает локальную часть тулзы на своем компе
A dangerous vulnerability in Internet Explorer 6 and 7 became publicly known before a fix was available, raising the specter of a high-risk zero-day attack.The bug involves the way IE handles Cascading Style Sheets (CSS) objects, and could let an attacker run any command on a targeted Windows XP, Vista, Server 2003, or Server 2008 PC. Bad guys have already posted sample attack code online. IE 8 is not affected
Illegal file sharing levels are still not declining despite a recent crackdown by the government, according to new research from British recorded music industry body the BPI.
A DNS hijacking attack left Twitter temporarily affected for about an hour early on Friday.
Microsoft launched a pilot test program for an online tech-support forum that will be staffed by paid “independent experts.”
The Novell-backed Moonlight project released the final Moonlight 2, an open source Linux/Unix clone of Microsoft's Silverlight framework that offers improved media streaming. Novell and Microsoft also announced that they will continue their Moonlight collaboration and extend Microsoft's patent covenant to Moonlight distributors other than Novell.
Someone hacked into the N.C. Community College System server and accessed Social Security and driver’s license numbers of college user libraries, including more than a thousand users of Pamlico Community College's library.
On Dec. 16, the Seoul police department reported that two Koreans were arrested in China as suspects of the fraud. Park, 27, and his accomplice used a cyber virus to obtain victims’ information, which they used to withdraw money from their bank accounts. They are being charged for breaching information technology network laws. Since late last year, an increasing number of similar frauds have been reported, but this is the first time that actual arrests were made.
Кто-то работает дома, а кто-то в офисе. Но у нас у всех почти одинаковые столы, одинаковые мониторы, одинаковые стулья. Некоторых это не устраивает и появляются такие чудные биологичные рабочие столы с настоящей травкой
Не прошло и трех дней после сдачи моей прошлой статьи, как в голове родилась совершенно новая и куда более эффективная методика работы с Blind SQL Injection. Если ты помнишь, я рассказывал о том, как существенно уменьшить количество запросов к серверу при работе с уязвимостями такого рода
Botnet operators have always been able to easily infect and convert PCs into bots, but they also are increasingly going after servers -- even building networks of compromised servers.
Millions of user passwords to social networking sites have been exposed, after a serious SQL injection flaw on the Rockyou.com website left login details - stored in plain text - up for grabs.
The international hacker who has admitted to stealing more than 130 million payment card numbers has mounted a new defense claim that he might suffer from Asperger's syndrome, a court filing indicates.
The FBI has accused a man of copyright infringement for allegedly uploading to the Web the feature film "X-Men Origins: Wolverine" last spring.
Conficker may be under control, but the malicious family of programs is resident on more than 6.5 million computers worldwide, with more than 5 percent of some network's Internet addresses showing signs of infection.
Users should disable JavaScript in Adobe's Reader and Acrobat tools to protect themselves until a patch for a just-disclosed vulnerability is available, security experts said today.
Malware purveyors are exploiting web vulnerabilities in appleinsider.com, lawyer.com, news.com.au and a dozen other sites to foist rogue anti-virus on unsuspecting netizens.
Public fascination with television's "CSI" forensic detectives and with the virtual reality depicted in the "Matrix" films may be partly responsible for the high level of interest garnered by a Defense Department contest to solve cyber crimes.
As 2009 draws to a close and a new decade dawns, CSOonline has reached out to some of the industry's best known security pros in search of insight on what the next 12 months and beyond have in store for our IT and cyber infrastructure. Each participant was asked to make five predictions.
Research carried out by Bell Micro, the IT systems distributor, claims to show that 67% of organisations believe there is a greater threat to their IT systems security and integrity from within their organisation than from hackers outside.
Cybercriminals are lazy. Given the choice between adapting their malicious software to a new operating system or focusing on users who haven't made the switch, they'll inevitably choose the path of least resistance, according to a new report from Finnish security firm F-Secure.
In a newly released report, security researcher claims that Google’s reCAPTCHA, one of the most widely adopted free CAPTCHA services, contains weaknesses that would allow a 10,000 infected hosts botnet the ability to achieve 10 recognition successes every second, allowing it to register 864,000 new accounts per day.
Rest assured that 2010 is going to be a big year for the Android operating system, with many new handsets finding their way to stores around the world (including Google’s own phone) and an increasing number of developers building tools, games and the likes for the fast-growing platform.
According to web analytics company Net Applications, Chrome marketshare leaped to 4.4 percent last week, based on the analysis of 160 million unique visitors to 40,000 sites. Meanwhile, Safari only held 4.37 percent of the market. A narrow victory? Sure. But a victory the nonce.
A damaged Telstra cable under Melbourne airport brought down the airline's telecommunications service provider, crippling its passenger check-in process from lunchtime yesterday and forcing the cancellation of 48 flights.
Если ты считаешь, что Tor - это исключительно средство для обеспечения приватности в сети, то ты неправ дважды. Во-первых, его распределенную сеть можно использовать в разных целях. А, во-вторых, не так уж безопасен черт, как его малюют
Когда вам говорят об опасностях длительной работы за компьютером, какие риски чаще всего вспоминают? Испортишь глаза! Будет болеть спина! Все это верно, но риски для глаз практически сведены "на нет" хорошим монитором, а спина любит спортзал и хорошее кресло