1,390 Topics

Member Avatar for
Member Avatar for happygeek

UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to …

Member Avatar for LastMitch
1
377
Member Avatar for Priti_P

Hello there, My query is like- I have one pdf and xls file as link. When any employee try to click on that link, then it should ask me for credentials as name(pmp) and password(123) if these two things matches, thwn only it should allow you to view/download taht xls/pdf. …

Member Avatar for diafol
0
242
Member Avatar for happygeek

Users of online banking services are at risk from a new 'in the wild' Trojan, Hesperbot, which has been discovered by the ESET malware research lab. Researchers have found that infections of users in Turkey are currently most rife, with users in the Czech Republic, Portugal, Thailand and the United …

Member Avatar for ss125
2
393
Member Avatar for GeekPlease
Member Avatar for happygeek

Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by …

Member Avatar for LastMitch
1
338
Member Avatar for happygeek

According to the fourth annual [Web Application Attack Report](http://www.imperva.com/download.asp?id=419) from Imperva retailers suffer from twice as many SQL injection attacks when compared to other industry sectors. What's more, the United States remains the number one source of all web attacks. Other key findings of the report include the startling revelation …

Member Avatar for LastMitch
3
330
Member Avatar for happygeek

Java vulnerabilities have hardly been out of the news during the last year. Here at DaniWeb we've covered a number of the stories as they surfaced: [Java in the cross-hairs: the security debate rolls on](http://www.daniweb.com/software-development/java/news/445532/java-in-the-cross-hairs-the-security-debate-rolls-on), [Is Java 7 still insecure? Oracle Patch doesn't fix underlying vulnerability](http://www.daniweb.com/software-development/java/threads/432479/is-java-7-still-insecure-oracle-patch-doesnt-fix-underlying-vulnerability), [Update my insecure Java …

Member Avatar for masijade
3
363
Member Avatar for saadi06

Hi, I am working on a testing tool and the testing tool asks the user to insert the user certificate in cert format like test.cert format and sends an encrypted attached file to my email id. Once I have received the file I want to download that file and decrypt …

Member Avatar for CimmerianX
0
289
Member Avatar for yankeefan24

Im having problems with Tomcat on a red hat virtual box. Tomcat is installed and it talks to java. it work localhost to localhost but when I try to open port 8080 from outsite localhost it wont work. Any ideas why? Im new to Tomcat and JSP

Member Avatar for ajaykiet2
0
161
Member Avatar for happygeek

FireEye Labs has released a set of tools with the sole purpose of helping organisations detect and examine infections by the Poison Ivy RAT. Cleverly called Calamine, this collection of free tools promises to give security professionals the opportunity to identify the indicators of a Poison Ivy attack including the …

1
206
Member Avatar for happygeek

Research published today by data governance software developer Varonis reveals that, when it comes to the virtualized environment, security awareness appears to be something of a black hole. The [study](http://eu.vocuspr.com/Publish/517692/vcsPRAsset_517692_109957_85137914-8b53-4005-b292-0c87aa89763a_0.png) found that data security in these virtualized environments can all too often be totally neglected, and some 48% of IT …

Member Avatar for vibinpattuath
3
548
Member Avatar for happygeek

Security researchers at ESET [have revealed](http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/) that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious …

Member Avatar for np complete
1
909
Member Avatar for happygeek

A couple of years ago, a 17 year old was arrested for his part in a denial of service attack against gamers playing the online multiplayer version of Call of Duty: Black Ops. The teenager was accused of selling cheat software called 'Phenom Booter' which prevented others from playing (it's …

Member Avatar for mrgreen
1
505
Member Avatar for happygeek

Fast food chain KFC has had more than its fair share of Kentucky Fried WHAT? myths busted over the years. However, some of the stories turn out to be genuine such as the [breaded and deep fried kidney](http://www.huffingtonpost.com/2013/01/07/ibrahim-langoo-brain-kidney-kfc_n_2425917.html) that was discovered by Ibrahim Langoo in a KFC in Colchester, England …

Member Avatar for peter_budo
2
995
Member Avatar for happygeek

The whole culture of Bring Your Own Device (BYOD) in the workplace has reignited the mobile device security debate. Although there are many ways to protect data, the first line of defence when a mobile device (be it a tablet or smartphone) is lost or stolen is almost always going …

1
240
Member Avatar for JA

I am looking for project ideas for my yearly software project , which has duration of 6 months . I am very much interested in developing network/security related tool . Any kind of suggestion will be highly apreciated . Thank in advance

Member Avatar for ss125
0
268
Member Avatar for happygeek

Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya …

Member Avatar for Begginnerdev
0
616
Member Avatar for happygeek

A successful tournament poker player from Japan, with earnings estimated at $1.5 million from his prowess at bluffing and holding his nerve under pressure, has been arrested and charged with being behind an Android malware distribution operation that netted even more: $3.9 million according to Symantec. The Chiba Prefectural Police …

0
403
Member Avatar for adamhmiles

USB flash drives are involved in a large number of incidents of data breach. How do you make your USB drive safe?

Member Avatar for rubberman
0
229
Member Avatar for happygeek

If you were asked to paint a verbal picture of the Internet in just five words, would they be porn, drugs, spam, Twitter and zombies? After analyzing an amazing two billion emails a day for three months, that's the image arrived at by one research outfit. [attach]15822[/attach]The latest [URL="http://www.commtouch.com/download/1753"]Internet Threat …

Member Avatar for GrimJack
0
432
Member Avatar for Vincentas

EDIT: links fixed Hello guys ! Alot of people today want or actually have a website. But do they really understand the possible risks and dagers on the internet? You can never know when hackers or other institutions will target you, and people do not realize that your personal information …

Member Avatar for M.Ledovich
1
265
Member Avatar for happygeek

New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about …

Member Avatar for LastMitch
2
446
Member Avatar for happygeek

Global online cash provider [Ukash](http://www.ukash.com), founded in 2001 and with a presence in more than 50 countries across 6 continents, has warned users not to get scammed by a loan company con doing the rounds at the moment. Ukash works on a code basis, with the user buying a voucher …

Member Avatar for LastMitch
0
511
Member Avatar for happygeek

Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and …

1
377
Member Avatar for hackoman96

is it posssible to hack into any network using only the knowledge of html and css???

Member Avatar for BMXDad
-1
288
Member Avatar for sharma.chiragfaith

I have created an online PHP code executor at http://web.guru99.com Though I have checked all security aspects … do you experts see any major flaw that I need to care of?

Member Avatar for cereal
0
215
Member Avatar for happygeek

Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s …

Member Avatar for LastMitch
2
365
Member Avatar for ing

Hello. I'm trying to set up a private section of my website for testing and I'm having a problem where my .htaccess / .htpasswd protection always rejects my password. I've set permissions to 604 on both files as recommended by my web host and both files reside in the same …

Member Avatar for cereal
0
411
Member Avatar for canadafred

Well looks like Google (the company whose corporate motto is "Do no evil") was implicated by the Snowden leak as vastly co-operating with other Internet companies and the American government to find and collect as much international private data as possible about as many foreigners as posiible. Things like telephone …

Member Avatar for Alex Thompson
1
220
Member Avatar for happygeek

The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing …

Member Avatar for analyzea
2
497

The End.