4,338 Archived Topics

Remove Filter
Member Avatar for
Member Avatar for Michael_Knight

[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It …

Member Avatar for Elina Tsai
0
357
Member Avatar for Michael_Knight

If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question …

0
138
Member Avatar for happygeek

It has been a couple of months now since a Russian security researcher, Evgeny Legerov, confirmed that the widely deployed media software RealPlayer was vulnerable to a zero-day exploit. The Russian company, Gleg, is in the business of selling information on such exploits and security flaws. Unfortunately, according RealNetworks's Vice …

Member Avatar for MattEvans
0
321
Member Avatar for Michael_Knight

In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and …

0
283
Member Avatar for newsguy

It has been a long time coming, but a virus writer has finally been arrested by the Japanese authorities. According to security specialists [URL="http://www.sophos.com"]Sophos[/URL] law enforcement agencies in Kyoto, Japan, have arrested three men who stand accused of plotting to infect users of a popular P2P file-sharing network with a …

Member Avatar for Chaky
0
256
Member Avatar for happygeek

A CIA analyst speaking at the SANS 2008 SCADA and Process Control Summit in New Orleans has admitted that hackers have not only been able to penetrate the power grids of several countries, but also successfully cut power to several cities, all from the relative safety of the Internet. Central …

Member Avatar for rabbit1840
0
320
Member Avatar for happygeek

Kaspersky Lab has [URL="http://www.viruslist.com/en/analysis?pubid=204791980"]published its list[/URL] of the most prevalent viruses for the end of 2007, and although an email worm retains the top spot the more interesting stuff is happening immediately below it in the rankings of shame. Specifically, the second, fourth and seventh places which are all occupied …

Member Avatar for just2rock
0
297
Member Avatar for newsguy

Nick Breese is a researcher with New Zealand based security outfit [URL="http://security-assessment.com/"]Security-Assessment.com[/URL] and found himself giving a presentation at the Kiwicon hacker conference in Wellington earlier this week. His presentation looked at the use of the PlayStation 3 games console to crack passwords, and Breese concluded that when compared to …

Member Avatar for Games
0
952
Member Avatar for newsguy

Research commissioned by Internet security software makers [URL="http://www.avguk.com/stop-cybertheft"]AVG[/URL] has revealed that one in three people in the UK have experienced some kind of cyber theft over the Internet. What's more, it is also one of the UK's most feared crimes, outranking burglary, assault and robbery according to the independent study …

Networking cybersecurity
0
453
Member Avatar for newsguy

[URL="http://www.mcafee.com"]McAfee Inc[/URL]. has today released the results of new research which found that nearly one in four people in Europe are putting themselves at increased risk of online fraud or identity theft simply because of poor password habits. The research, of 3500 consumers in the UK, France, Germany, Italy, Spain …

Networking cybersecurity
Member Avatar for ahihihi...
0
367
Member Avatar for happygeek

In the UK last year there were a staggering 3,237,500 cybercrimes committed according to a new [URL="https://www.garlik.com/index1.php?page=cybercrime"]report[/URL] from online identity specialists [URL="http://www.garlik.com"]Garlik[/URL] in collaboration with leading criminologists. Do the math and that works out to one cybercrime committed every ten seconds in the UK alone. Of these, some 60 percent …

Networking cybersecurity
Member Avatar for DoradoJuez
0
300
Member Avatar for happygeek

According to a report in the [URL="http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html"]Financial Times[/URL] of all publications, the Chinese military has hacked the Pentagon in what it describes as the most successful cyber attack on the US defense department to date. Although the Pentagon has acknowledged that a computer system which serves the office of US …

Networking cms cybersecurity
Member Avatar for scru
0
601
Member Avatar for happygeek

A Symantec Security Response [URL="http://www.symantec.com/enterprise/security_response/weblog/2007/08/a_monster_trojan.html"]posting[/URL] suggests that Monster.com, the huge job hunting website, has been subject to an online attack resulting in the theft of personal data in the form of resumes of its users. "We analyzed a sample of a new Trojan, called Infostealer.Monstres, which was attempting to access …

Member Avatar for happygeek
0
493
Member Avatar for happygeek

Jeff Jones is a Strategy Director in the Microsoft Security Technology Unit, part of the team trying to make Microsoft products more secure, poor guy. No surprise that he publishes a vulnerability report on his Microsoft TechNet hosted [URL="http://blogs.technet.com/security/default.aspx"]Security Blog[/URL] which always seems to suggest that Microsoft Windows is far …

Member Avatar for Infarction
0
369
Member Avatar for happygeek

Twenty years ago the hard drives I recall using might not have been fast in the data transfer stakes, they were certainly not lithe and sexy pieces of hardware and I prefer not to think how much I actually paid for a large and clunky bit of kit to store …

Networking hard-drive storage
Member Avatar for WangVS
0
271
Member Avatar for Evenbit

[CODE]Using 'common sense' to clear the Microsoft fog of illusion.[/CODE] [[ ...Continued from previous post [url]http://www.daniweb.com/blogs/entry1527.html[/url] ]] 4. Unable to comprehend security issues. Even when the United States government warns people to avoid using specific software for personal security reasons, the Microsoft sheep act like they don't understand the reasons. …

Member Avatar for Evenbit
0
128
Member Avatar for happygeek

According to a posting by someone calling themselves Gabriel, published on the Full Disclosure list (warning – [URL="http://seclists.org/fulldisclosure/2007/Jun/0380.html"]this link[/URL] contains the so-called plot spoiler), the ending of the yet to be published Harry Potter and the Deathly Hallows book has been revealed. Not by magic or wizardry, but by good …

Member Avatar for happygeek
0
351
Member Avatar for newsguy

As reported [URL="http://www.daniweb.com/blogs/entry1490.html"]here[/URL] last week, three security flaws had been discovered that impacted upon the 2.6.x Kernel. A NULL-pointer dereference within netfilter when handling SCTP connections with unknown chunk types that could be exploited to crash the kernel; a cpuset_task_read() function in /kernel/cpuset.c which had an underflow error that could …

Member Avatar for Sturm
0
403
Member Avatar for newsguy

According to postings at [URL="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"]Kernel.org[/URL] concerning a report by Vilmos Nebehaj which was consequently signed off by Linus Torvalds and Chris Wright, the Linux Kernel 2.6.x has multiple security vulnerabilities. Well, to be precise, two vulnerabilities and what is described as a ‘weakness’ which are capable of being exploited by …

Member Avatar for Marks256
0
418
Member Avatar for happygeek

Independent Austrian antivirus testing outfit [URL="http://www.av-comparatives.org/"]AV Comparatives[/URL] has a reputation for going the extra mile when putting products through their paces. Something that Microsoft discovered to its cost earlier in the year when, rather embarrassingly, its flagship OneCare antivirus product managed to finish last and fail to get a highly …

Member Avatar for Anthea_123
0
432
Member Avatar for newsguy

[URL="http://www.gentoo.org"]Gentoo[/URL] has issued a security advisory with a high impact rating affecting users of PHP <5.2.2. Several vulnerabilities have been found in PHP, not least a huge number discovered by Stefan Esser during the infamous Month Of PHP Bugs (MOPB) including integer overflows in wbmp.c from the GD library and …

Networking cybersecurity php
Member Avatar for newsguy
0
507
Member Avatar for happygeek

IT security professional Didier Stevens has been conducting an experiment into computer user stupidity by running a Google Adwords campaign which offers to infect your PC for free. The advert actually read: [B]Drive-By Download Is your PC virus-free? Get it infected here![/B] Which should be enough to stop all but …

Member Avatar for jwenting
0
579
Member Avatar for happygeek

For the average user spam has always been an annoyance. For the average spammer it has always been about making money. For the criminal gangs that have muscled in on this lucrative industry during the last few years it is now about territory and control. Control, that is, of the …

Member Avatar for Infarction
0
759
Member Avatar for happygeek

GPS satellite navigation devices have become an indispensable part of everyday life for millions of drivers the world over. Without these little technological route planning miracles, many of us would literally crash and burn as we struggled to regain control over that map while driving too fast and drinking a …

Member Avatar for Junyah
0
358
Member Avatar for John A

If you're visiting a known site such as Google.com, you're perfectly safe, right? Wrong. New DNS vulnerabilities in Microsoft's Windows 2000 and 2003 severs could potentially allow a DNS server to get hijacked, and redirect a user to a completely different site than they expected to see. The vulnerability exists …

Networking abuse cybersecurity dns
0
532
Member Avatar for newsguy

The [URL="http://www.itu.int"]International Telecommunication Union[/URL] (ITU)[URL="http://www.itu.int/"][/URL] and the [URL="http://www.aptsec.org"]Asia Pacific Telecommunity[/URL] (APT)[URL="http://www.aptsec.org/"][/URL] today announced the outcome of a jointly organized workshop in Bangkok, Thailand which addressed plans for the implementation and development of Next-Generation Networks (NGN) in the region. With over 180 experts from 24 countries attending, including representatives of international …

Member Avatar for happygeek
0
478
Member Avatar for happygeek

I have been a supporter of RAID for the longest time; after all it would be crazy not to like something that brings efficiency and protection to the data storage process. RAID has certainly provided both, but that was then and this is now, and it is time for RAID …

Member Avatar for egadfly
0
589
Member Avatar for happygeek

IT security specialist [URL="http://www.sophos.com"]Sophos[/URL] is warning anyone with a website about recently uncovered evidence that spammers are hacking into legitimate sites in order to sell drugs. Online pharmacy spam, be it under the Viagra or just general prescription drug banner, has become one of the most annoying and persistent forms …

Networking abuse cybersecurity php
Member Avatar for XXPepper
0
855
Member Avatar for Mushy-pea

I invented an encryption algorhythm today and used it to "hide" the information in an unused password I came up with. This was done on paper, not with a program. However, I am planning to start laying some code down for this today (in Haskell, partly as an exercise to …

Networking encryption perl regex
Member Avatar for Michael_Knight
0
120
Member Avatar for PirateTUX

Just recently, the development group that I work with decided to adopt Linux as our standard operating system for the server-side of our project. Linux is a great choice of server OS for many obvious, and not-so-obvious, reasons. It's extremely flexible, stable, and secure, and works on just about any …

Member Avatar for jbennet
0
115
Member Avatar for happygeek

J.K.Rowling has now officially announced that the latest, and last, in the Harry Potter series of books will be called ‘Harry Potter and the Deathly Hallows’ putting an end to the frenzy of speculation on the subject over the last few months. While it has been genuine fans interested in …

Member Avatar for ntvnat
0
373
Member Avatar for happygeek

According to my Finnish friends, [URL="http://www.f-secure.com"]F-Secure[/URL], Bagle looks like it might be back in business. Not that it has ever really gone away of course, as it is one of the most prevalent of worm families. F-Secure have noticed new activity during the last couple of days, which sees a …

0
323
Member Avatar for happygeek

London taxi drivers have a reputation as being amongst the most opinionated and talkative in the world, and their grueling training and testing program ‘The Knowledge’ is equally well known. Now, it appears, the black cab driver has a new claim to fame: the place where more technology kit is …

Networking cybersecurity
Member Avatar for happygeek
0
306
Member Avatar for happygeek

[URL="http://www.kaspersky.com/"]Kaspersky Lab[/URL] has released its latest Malware Evolution [URL="http://www.viruslist.com/en/analysis?pubid=204791907"]report[/URL], covering the period between June and September 2006 and, as usual, it makes for interesting reading. Alexander Gostev, Senior Virus Analyst, Kaspersky Lab comments that the first six months of 2006 was “notable for the complexity of the technologies which antivirus …

Member Avatar for Anthea_123
0
325
Member Avatar for happygeek

I hate it, you hate it, [B]everyone hates spam[/B]. Perhaps just as annoying as the fact that most of us have no interest in improving our sexual performance, enlarging our sexual organs or accepting a refinancing deal from a complete stranger, is the fact that we just do not know …

Member Avatar for happygeek
0
594
Member Avatar for happygeek

Microsoft has issued an [URL="http://www.microsoft.com/technet/security/advisory/927709.mspx"]advisory [/URL]warning about a Visual Studio 2005 vulnerability in the WMI Object Broker ActiveX control, part of WmiScriptUtils.dll which could allow remote arbitrary code execution. The WMI Object Broker ActiveX control will circumvent the ActiveX security model, because it is marked as being ‘safe for scripting’ …

0
291
Member Avatar for happygeek

According to Symantec, 64% of small businesses have seen a surge in the volume of spam received during the previous six months. And it isn’t the only one: whether you talk to ISPs or security vendors, gateway mail filtering services or end users, the message is the same. Spam is …

0
762
Member Avatar for happygeek

The [URL="http://www.acte.org"]Association of Corporate Travel Executives[/URL] (ACTE) has warned, during a conference in Barcelona this week, that the visitors to the United States risk having their laptops seized and searched on arrival and departure. The law applies equally to US and non-US passport holders, and following an appeal judgment in …

Networking cybersecurity legal
Member Avatar for stephanopoulos
0
341
Member Avatar for happygeek

According to a survey by the [URL="http://www.ponemon.org"]Ponemon Institute[/URL], sponsored by [URL="http://www.pgp.com"]PGP Corporation[/URL] and [URL="http://www.vontu.com"]Vontu Inc[/URL], the true cost of data breaches in 2006 was $182 per compromised record on average, that is a 31% increase over the 2005 figures. Furthermore, the results of the report, published today, reveal that the …

Networking cybersecurity legal
0
384
Member Avatar for happygeek

You cannot fault the Japanese arm of Mc Donald’s for moving with the times and giving away Flash MP3 players as prizes in a competition to customers who bought large Coca-Cola drinks. But, to be honest, I would rather have had the usual tacky plastic movie tie-in toy because at …

Member Avatar for 1337_MilkMan
0
462
Member Avatar for sid78669

Hey, In my college, the internet is accessible after you connect to the college's (open/public) wireless network and login using a web page that opens up when you try to open sites without logging in. I am trying to set that feature for my home network, but have not been …

Networking lan-wan
Member Avatar for gbarnas
0
171
Member Avatar for krenrae

I apologize if I'm posting in the wrong spot, this is a first time for me. My wireless computer is connected to the internet but I can't update the virus definitions in my anti-virus program. I've tried downloading a different anti-virus program but I can't get to the websites. The …

Networking
Member Avatar for Xlphos
0
136
Member Avatar for ip2host

Hello, i have a strange problem.. I have a branch office and its connected to main office thru Cisco vpn. it has its own subnet. now on one of the comps I cannot make oultook run localy nor I can map drive. when I try mapping with IP it works …

Networking dns
Member Avatar for Number 3
0
116
Member Avatar for lotusorbit

Is Netgear Wireless Router and Linksys Switch compatible? is there any conflict if the two device connected?

Networking
Member Avatar for Nauman Badiwale
0
59
Member Avatar for Ireng

Hi all, I want to discuss my recently encountered problem. I'm a newbie in this forum and IT-related issue so please explain the solution as simple as possible if u can. My laptop and connection condition : I have an ACER-aspire 5572NWxMi laptop I am living in a dormitory and …

Networking dns
Member Avatar for Nauman Badiwale
0
165
Member Avatar for imtrble

Hi all - This is going to seem like an odd post since it's not too technical in nature, but I'm hoping you can help set my mind at ease or confirm my high level of anxiety. I was on my home computer using Yahoo Messenger and chatting with a …

Networking
Member Avatar for sknake
0
112
Member Avatar for Skeane12

I just got a linksys WRT54GC. I followed the step by step instruction and at step 6 where the internet connection is tested, it always says no internet connection was found, check cables. I checked the cables and they are fine. I tried going to the routers IP address and …

Networking dns
Member Avatar for FearlessFourie
0
245
Member Avatar for hisoka

Hi to all. I want to setup my personal computer a personal firewall... what do you think firewall can I use? thanks.

Networking
Member Avatar for Nauman Badiwale
0
140
Member Avatar for Anpippin

Ok I went to RadioShack today, looking for an internal wireless card, but they did not have any internal wireless cards, so I ended up getting a Netgear Wireless-G USB 2.0 Adapter. It is 54 Mbps, 2.4 GHz, and 802.11g. But it seems kind of slow and it shows my …

Networking
Member Avatar for LaptopNomad
0
278
Member Avatar for gc_don

If i use the pc without lan, it works fine no problem at all. But the moment i connect the pc on LAN, it shuts down. Using cross cable i can connect it to another desktop. But not possible to connect to LAN using straight cable. Tried changing port and …

Networking
Member Avatar for Nauman Badiwale
0
204

The End.