Xbox 360 взломан
Итак, наконец вскрыли Xbox 360 и запустили сторонний код без подписи.
Итак, наконец вскрыли Xbox 360 и запустили сторонний код без подписи.
Webroot Tuesday announced it has extended its cloud-based Web security service, adding a way to filter outbound as well as inbound Web traffic, monitoring for threats in order to detect and block malware such as botnets that have infected computers.
One of the ways Microsoft plans to push Internet Explorer 6 and Internet Explorer 7 users to upgrade to Internet Explorer 8 is convincing them the latest version is much more secure, which it is. Dean Hachamovitch, general manager of Internet Explorer, last week posted a story on the IEBlog about how IE8 managed to block a malicious webpage he was linked to by one of his close friends on Facebook
A new version Metasploit released today includes integrated vulnerability scanning for the popular open source penetration testing tool.
While more companies reported malware infections, denial-of-service attacks, financial fraud and password sniffing in the last year, claimed damages due to the attacks had shrunk, according to the latest survey of security managers and corporate executives conducted by the Computer Security Institute.
The head of the Climatic Research Unit (CRU) at the University of East Anglia has temporarily stepped down while an investigation is carried out into hacked emails and documents from the organisation’s servers.
Microsoft is denying reports that its latest monthly security update is causing users to experience serious system problems.
A group of restaurants is demanding millions of dollars in damages from two companies accused of selling point-of-sale terminals that exposed customer data to criminal hackers.
Miscreants have developed a ransomware package that blocks internet access in a bid to force infected users into paying up by sending a text message to a premium rate SMS number, lining the pocket of cybercrooks in the process.
Проблема случайного касания тачпада ноутбука при печати касается многих пользователей ноутбуков. Т.е. вы, набирая текст, касаетесь изголовьем большого пальца тачпада и курсор перепрыгивает в другое место, где вы продолжаете набор
Как безболезненно перейти с Windows XP на недавно вышедшую Windows 7, и при этом не потерять свои документы и настройки? Изучив материалы на сайте Microsoft, я пришел к выводу, что они мне не подходят. Инструкция содержит столько пунктов и так пестрит вводимыми вручную командами, что браться за осуществление переноса данных по ней я не стал — мне показалось это слишком сложным, слишком английским, слишком непонятным
Третьего ноября этого года в Sysinternals был закрыт проект по развитию NewSID – утилиты, позволяющей менять идентификатор защиты компьютера (machine SID). Я написал NewSID (тогда она называлась NTSID) в 1997 году, поскольку на тот момент единственной программой, позволявшей менять SID, была утилита от Microsoft под названием Sysprep, которая не поддерживала смену идентификаторов защиты на тех машинах, на которых уже были установлены приложения.
First question: How tough are Thinkpad notebooks? Tough enough to be installed in buses and tram shuttles as seats and keep working just fine. Second question: Are the trackpads scrotumsensitive? I like to think they are.
The Honeynet Project has beefed up a free tool that helps spot attacks that can elude detection. The Picviz tool takes data from various log analysis sources and converts them into a multidimensional visual map of events.
A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.
JB Hi-Fi's website was redirecting customers to malicious web pages over the weekend in a cyber attack that appears to have affected several other Australian websites in the lead-up to Christmas.
Authorities have arrested a British man and cautioned him for stealing accounts for online game Runescape, BBC News reported.
Hackers have developed a distributed Wordpress admin account cracking scheme that poses a severe risk for the security of blogs whose owners select insecure passwords.
The newly-created 24 U.S. Air Force is about to bring limited aspects of its cybersecurity command operations center online. InfoSecurity reports the unit, established in August, will be launching the San Antonio-based cybersecurity facility by the end of the year. The commander of the unit, Major General Richard Webber, said that the cybersecurity center was still working to understand the scope of cyberwarfare operations.
New tools capable of quickly finding, gathering and correlating information about individuals from social networking sites and other public sources are giving online scammers a powerful new weapon, say security researchers.
Microsoft today confirmed that it is looking into reports that November's security updates have triggered a black screen on some Windows users' PCs.
Насколько серьезную опасность может представлять собой инъекция в Web-приложении? Наверняка ты не раз слышал, о дефейсах, сливе инфы и прочей пакости. Что делать, если сервер надежно спрятан за DMZ? Можно сложить руки и довольствоваться малым, убедив себя, что админы молодцы и сделать больше ничего нельзя
IBM is set to buy database security firm Guardium for $225m.
The US Department of Justice announced today that a California man has pled guilty to trafficking counterfeit computer chips to the US military. Neil Fehaly agreed to cooperate with the government as part of his plea deal, and he faces up to five years in prison for passing off bogus versions of chips from Intel, VIA, STMicro, Analog Devices, and other chipmakers to the Navy. These counterfeits, some of which were outright fakes from China, and others of which were "remarked" versions of cheap chips that had been made to look like more expensive parts, have gone into countless critical military systems since the scam started, possibly endangering the lives of military personnel and civilians.
UK home secretary Alan Johnson has decided that Gary McKinnon should be sent to the US to face trial on hacking charges.
As we prepare to stuff our faces with a bountiful Thanksgiving feast, we turn our Thanksgiving spirit to the gobs of free software we love to say thank you to the developers, and to give our computers a feast of their own.
The 21-year-old hacker who wrote the first iPhone worm has landed a job developing software for the phones.
Microsoft released data collected from an FTP-server honeypot, showing that attempts to guess passwords continue to focus on the low-hanging fruit: passwords with an average length of eight characters, with "password" and "123456" being the most common.
Ubisoft said that the website of its popular video game Splinter Cell had been hacked on Thursday. However circumstantial evidence suggests the hack is more likely to be a publicity stunt than a genuine cyber assault.
A malicious spam campaign that attempts to harvest online game passwords under the guise of messages containing smutty photos is doing the rounds.
Customers of an UK-based web host called Daily Internet Services, had their websites defaced by hackers, who replaced their index pages with an image featuring Tux, the Linux penguin mascot. The company has restored the affected pages from back-ups and is currently investigating the attack.
Britain faces a new threat from the sharp increase in cyber-crime with sophisticated hackers leaving the government far behind in its attempts to catch them, according to the world's leading expert in online security.
Hackers could evade most existing antivirus protection by hiding malicious code within ordinary text, according to security researchers.
Windows 7 has a had a very successful launch and has sold more copies than OSX during the second and third weeks in November. Overall sales of Windows 7 are projected to oversell both OSX and Windows Vista next year.
В предыдущей статье было продемонстрировано, как тривиальная инъекция может привести к гибели сервера, а точнее, к получению контроля над ним злоумышленником. Тогда мне в значительной степени повезло, так как доступ к БД через скуль открывал завесу к паролям от FTP
MacOS по праву считается одной из самых красивых и самых удобных операционных систем. Это основано, прежде всего, на удобном интерфейсе и "фишках", которые этот интерфейс содержит. Одной из таких "фишек" являются виджеты — удобные мини-приложения, каждое из которых выполняет свою, строго определенную функцию
A call for intercepted data to be destroyed "as soon as it is no longer required" has been described as shortsighted by the director of one of the country's leading forensic computer labs.
Microsoft has been issuing takedown notices for publicly hosting its leaked Computer Online Forensic Evidence Extractor (COFEE) tool. The company sent off "Demand for Immediate Take-Down: Notice of Infringing Activity" to companies hosting websites that offered the tool. The e-mails all start with the following standard statement: "Microsoft has received information that the domain listed above, which appears to be on servers under your control, is offering unlicensed copies of, or is engaged in other unauthorized activities relating to copyrighted works published by Microsoft."
Google has defended its free Analytics web traffic service against arguments that it conflicts with web users' privacy.
The blaze of publicity that accompanied the release of the first iPhone worms this month has sparked interest in selling anti-malware products for the device. However no such security products currently exist and Apple shows little inclination in licensing any that do get developed.