1,390 Topics
| |
UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to … | |
Hello there, My query is like- I have one pdf and xls file as link. When any employee try to click on that link, then it should ask me for credentials as name(pmp) and password(123) if these two things matches, thwn only it should allow you to view/download taht xls/pdf. … | |
Users of online banking services are at risk from a new 'in the wild' Trojan, Hesperbot, which has been discovered by the ESET malware research lab. Researchers have found that infections of users in Turkey are currently most rife, with users in the Czech Republic, Portugal, Thailand and the United … | |
Anyone familiar with kind of error? I'm so lost. Please help. | |
Within days of the New York Times website suffering an outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an internal issue following system maintenance, media sites belonging to CNN, Time and the Washington Post have been attacked by … | |
According to the fourth annual [Web Application Attack Report](http://www.imperva.com/download.asp?id=419) from Imperva retailers suffer from twice as many SQL injection attacks when compared to other industry sectors. What's more, the United States remains the number one source of all web attacks. Other key findings of the report include the startling revelation … | |
Java vulnerabilities have hardly been out of the news during the last year. Here at DaniWeb we've covered a number of the stories as they surfaced: [Java in the cross-hairs: the security debate rolls on](http://www.daniweb.com/software-development/java/news/445532/java-in-the-cross-hairs-the-security-debate-rolls-on), [Is Java 7 still insecure? Oracle Patch doesn't fix underlying vulnerability](http://www.daniweb.com/software-development/java/threads/432479/is-java-7-still-insecure-oracle-patch-doesnt-fix-underlying-vulnerability), [Update my insecure Java … | |
Hi, I am working on a testing tool and the testing tool asks the user to insert the user certificate in cert format like test.cert format and sends an encrypted attached file to my email id. Once I have received the file I want to download that file and decrypt … | |
Im having problems with Tomcat on a red hat virtual box. Tomcat is installed and it talks to java. it work localhost to localhost but when I try to open port 8080 from outsite localhost it wont work. Any ideas why? Im new to Tomcat and JSP | |
FireEye Labs has released a set of tools with the sole purpose of helping organisations detect and examine infections by the Poison Ivy RAT. Cleverly called Calamine, this collection of free tools promises to give security professionals the opportunity to identify the indicators of a Poison Ivy attack including the … | |
Research published today by data governance software developer Varonis reveals that, when it comes to the virtualized environment, security awareness appears to be something of a black hole. The [study](http://eu.vocuspr.com/Publish/517692/vcsPRAsset_517692_109957_85137914-8b53-4005-b292-0c87aa89763a_0.png) found that data security in these virtualized environments can all too often be totally neglected, and some 48% of IT … | |
Security researchers at ESET [have revealed](http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/) that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious … | |
A couple of years ago, a 17 year old was arrested for his part in a denial of service attack against gamers playing the online multiplayer version of Call of Duty: Black Ops. The teenager was accused of selling cheat software called 'Phenom Booter' which prevented others from playing (it's … | |
Fast food chain KFC has had more than its fair share of Kentucky Fried WHAT? myths busted over the years. However, some of the stories turn out to be genuine such as the [breaded and deep fried kidney](http://www.huffingtonpost.com/2013/01/07/ibrahim-langoo-brain-kidney-kfc_n_2425917.html) that was discovered by Ibrahim Langoo in a KFC in Colchester, England … | |
The whole culture of Bring Your Own Device (BYOD) in the workplace has reignited the mobile device security debate. Although there are many ways to protect data, the first line of defence when a mobile device (be it a tablet or smartphone) is lost or stolen is almost always going … | |
I am looking for project ideas for my yearly software project , which has duration of 6 months . I am very much interested in developing network/security related tool . Any kind of suggestion will be highly apreciated . Thank in advance | |
Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya … | |
A successful tournament poker player from Japan, with earnings estimated at $1.5 million from his prowess at bluffing and holding his nerve under pressure, has been arrested and charged with being behind an Android malware distribution operation that netted even more: $3.9 million according to Symantec. The Chiba Prefectural Police … | |
USB flash drives are involved in a large number of incidents of data breach. How do you make your USB drive safe? | |
If you were asked to paint a verbal picture of the Internet in just five words, would they be porn, drugs, spam, Twitter and zombies? After analyzing an amazing two billion emails a day for three months, that's the image arrived at by one research outfit. [attach]15822[/attach]The latest [URL="http://www.commtouch.com/download/1753"]Internet Threat … | |
EDIT: links fixed Hello guys ! Alot of people today want or actually have a website. But do they really understand the possible risks and dagers on the internet? You can never know when hackers or other institutions will target you, and people do not realize that your personal information … | |
New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about … | |
Global online cash provider [Ukash](http://www.ukash.com), founded in 2001 and with a presence in more than 50 countries across 6 continents, has warned users not to get scammed by a loan company con doing the rounds at the moment. Ukash works on a code basis, with the user buying a voucher … | |
Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and … | |
is it posssible to hack into any network using only the knowledge of html and css??? | |
I have created an online PHP code executor at http://web.guru99.com Though I have checked all security aspects … do you experts see any major flaw that I need to care of? | |
Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s … | |
Hello. I'm trying to set up a private section of my website for testing and I'm having a problem where my .htaccess / .htpasswd protection always rejects my password. I've set permissions to 604 on both files as recommended by my web host and both files reside in the same … | |
Well looks like Google (the company whose corporate motto is "Do no evil") was implicated by the Snowden leak as vastly co-operating with other Internet companies and the American government to find and collect as much international private data as possible about as many foreigners as posiible. Things like telephone … | |
The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing … |
The End.