1,387 Topics

Member Avatar for
Member Avatar for happygeek

The 'World's Greatest Anti-Malware Software' is the spurious claim being made by Malwarebiter, which just so happens to sound an awful lot like Malwarebytes which could perhaps justifiably lay claim to that accolade. Take a look at this forum and you will see that Malwarebytes is a very valuable tool …

Member Avatar for wisemaster
1
343
Member Avatar for happygeek

According to IT security outfit Kaspersky, which has just [published details](http://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012) of the information security landscape as it was shaped during 2012, 99% of all mobile malware threats now target Android devices. With 6300 new mobile malware samples discovered every month on average across 2012, Android has become the focus …

Member Avatar for peter_budo
1
294
Member Avatar for happygeek

According to new research from Kaspersky Lab, in the form of a report called [Evaluating the threat level of software vulnerabilities](http://media.kaspersky.com/documents/business/misc/Kaspersky_Lab_Report_Software_Vulnerabilities_final.pdf), 72% of Java users haven't switched to the latest, safest, version despite highly publicised vulnerabilities and resulting security exploits. ![dweb-java011](/attachments/small/0/dweb-java011.jpg "align-right") And it's not just Java, the report also …

Member Avatar for JamesCherrill
2
468
Member Avatar for migcosta

Hey guys, First of all please don't consider this an act of spam, it is not my intencion to spam! I belong to a small team that created the visualCaptcha (visualcaptcha.net), and we are looking for some reviews from web developers. We have downloads but we don't get much feedback …

Member Avatar for IIM
0
107
Member Avatar for happygeek

According to new independent research commissioned by Corero Network Security, and conducted by the Ponemon Institute, two thirds of banks in the United States have suffered a Distributed Denial of Service (DDoS) attack during the last 12 months. The 64% statistic refers to the number of IT and IT security …

Member Avatar for LastMitch
3
237
Member Avatar for happygeek

Continuing with our round up of the IT security vendor view of the year to come, here's how PandaLabs, the malware research laboratory arm of [Panda Security](http://www.pandasecurity.com/), sees 2013 stacking up in terms of threats and exploits. ![panda](/attachments/small/0/panda.jpg "align-right") Perhaps unsurprisingly, PandaLabs predicts that 2013 will be much the same …

Member Avatar for LastMitch
0
290
Member Avatar for r14aul

My site has just been hacked and I suspect that it was a remote file inclusion attack. These are my server specs: Windows Server 2008 R2 running ColdFusion 9 (9.0.1.274733) and IIS 7.5 This is the source code of the page that appeared after my site was hacked: <!-- # …

Member Avatar for LastMitch
0
408
Member Avatar for HBovenkamp

Good day, I have a vb.net application that navigates to a series of url's and logs in, using credentials read from an external file. After navigating to some URL's a windows security pop-up appears and takes focus. Can anyone please point me to information to populate ths pop-up with credentials …

Member Avatar for tinstaafl
0
144
Member Avatar for happygeek

The UK-based [Surrey Police Force](http://www.surrey.police.uk/) has long since embraced Internet culture as being a way to help fight crime. It has an online crime reporting tool, active accounts on Facebook and Twitter, as well as a video channel on YouTube. But now it has moved into smartphone territory in order …

Member Avatar for Seten
1
422
Member Avatar for azareth

hello i just need some advice and suggestions the program(will be using vb.net & matlab) is about security software for flash drives where the user is required to say something(eg. a password) that will open or explore the device. the thing is when the flash drive is plugged to the …

Member Avatar for azareth
0
300
Member Avatar for Gribouillis

This snippet is easy: it defines an immutable wrapper around a sequence type (list, deque, etc) which allows a class, function or module to expose a read only version of a sequence to the outer world. A constant wrapper around mapping types could also be defined in a similar manner.

Member Avatar for Gribouillis
2
576
Member Avatar for happygeek

Network security vendor [Stonesoft](http://www.stonesoft.com/en/) predicts that the top infosec threats to watch out for in 2013 will include unseen and unknown targeted cyber-attacks, espionage and hacktivism. Jarno Limnell, director of cyber-security at Stonesoft, reckons that in 2013 the security of the digital world will become an even more pressing issue, …

Member Avatar for LastMitch
2
190
Member Avatar for happygeek

An in-the-wild exploit targeting a vulnerability with Java 7 has led to security experts the world over warning users to disable the Java plug-in for their browser clients at the very least, and preferably uninstall Java altogether. The CVE-2012-4681 vulnerability, comprising two flaws, along with a couple of other 'related …

Member Avatar for vmk99
0
684
Member Avatar for Szabi Zsoldos

Hi guys, I'm facing a weird problem with our Trustico Certificate. We have a webshop with customers that are logging in to make purchases of different products, all of this works nice untill the user changes his/her DATE on the Computer that he/she is using. If the date is changed …

Member Avatar for Szabi Zsoldos
0
274
Member Avatar for happygeek

According to the boffins at Kaspersky Lab, users of Android devices running Gingerbread (Android 2.3.6) and Ice Cream Sandwich (Android 4.0.4) are targeted the most by cybercriminals. Gingerbread accounted for 28% of all the attempts to install malware that were successfully blocked by Kaspersky, while Ice Cream Sandwich accounted for …

Member Avatar for adams161
2
226
Member Avatar for questorfla

I have read several replies here and I am in the process of testing them now but since this is a problem I need an urgent fix for, I thought it would not hurt to ask again. We have an Apache website that is extremely simple in design. It's main …

Member Avatar for yehuda2001
0
215
Member Avatar for happygeek

Microsoft has released YAIESA, or Yet Another Internet Explorer Security Advisory if you prefer. This time, [SA2757760](http://technet.microsoft.com/en-us/security/advisory/2757760) warns about a new zero-day out there in the wild which impacts all users of Internet Explorer 9 and earlier versions. It's the usual case of targeted attacks being spotted which could lead …

Member Avatar for mobb.deepghana
0
389
Member Avatar for happygeek

The results of a new security survey, which asked some 6,000 people across Europe questions about cybercrime, would appear to suggest that nearly everyone (88% of respondents in fact) is some kind of online victim. Have things really got this bad, or is it just another case of the security …

Member Avatar for sbesch
0
322
Member Avatar for game4tress

I'm trying to find a solution to protect all the software developed in the company I work in. Till now we've been working with hardlocks, but we are trying to cut on expences and wanting to develop our own software protection system. I know that there some free tools, like …

Member Avatar for stultuske
0
303
Member Avatar for joslup9

Hello guys, i need a help slightly with this project of my university. my equipment are working with some components, 1. Radius Server - MySQL - OS Linux Ubunto 12.04 or OS Microsoft WindowsServer2008 - SQLServer. 2. Router Linksys Wrt-54g 3. Other Server with certification unit, which we need manage, …

Member Avatar for JorgeM
0
243
Member Avatar for happygeek

Earlier this year Jonathan Evans, the Director General of MI5 (the UK Security Service), warned that cyber attacks against UK plc were as much of a security challenge as terrorism as far as Britain was concerned. He claimed that UK businesses were being targeted at an 'astonishing' rate driven by …

Member Avatar for johnedwards095
0
372
Member Avatar for happygeek

Gary McKinnon, an unassuming 46 year old Londoner who suffers from Asperger's syndrome and depression, is an unlikely man to be making headlines the world over once again. Indeed, across the last decade McKinnon has almost seemed to be a permanent fixture in news media feeds online and off, a …

Member Avatar for gerbil
0
534
Member Avatar for slfisher

LiveJournal users are up in arms over a modification to the service that they say allows users commenting to their online journals to also post those comments on Facebook or Twitter, even if the journal is set up to be restricted only to the owners' friends. In response to the …

Member Avatar for anumandava
0
547
Member Avatar for np complete
Member Avatar for happygeek

Samsung has fixed the Unstructured Supplementary Service Data (USSD) exploit that could remotely wipe data from a Galaxy S III smartphone, but that doesn't mean the USSD threat is over: far from it in fact. According to some security researchers, 400 million Android device users are at risk from having …

Member Avatar for solutionsinfini
0
661
Member Avatar for bharatgs7

Guys, I just want to know whether is there any way to give a security to the webpages hosted in server. For example, I have hosted jsp application using tomcat. I want to prevent someone from copying those files from tomcat in my computer(Maybe from C Drive). Anyhelp will be …

Member Avatar for JorgeM
0
135
Member Avatar for happygeek

The 'Murder Ball' competition is now underway at the London 2012 Summer Paralympics, also known as wheelchair rugby to some. However, you won't find Olympic athletes taking part in the warbiking event that has also been happening in London recently: warbiking is very much a sport for nerds. ![warbike](/attachments/small/0/warbike.jpg "align-right") …

Member Avatar for UrbanKhoja
0
368
Member Avatar for bossie09

If audit log is turn off on the windows server, can i use a software to generate & view the log files. If yes please suggest the tool. Regards,

Member Avatar for JorgeM
0
293
Member Avatar for sandhu.sandhu

I need some project ideas on cryptography/information system securoty for a simple and small project.......

Member Avatar for np complete
0
131
Member Avatar for dban07

Hello friends, I'm a Computer Security student. I need some opinions for my Final Year Project idea. Im planning to create an application on VB.NET which protects a network from unknown users like hackers by filtering their MAC addresses/Hostname/IP. The application will work similar to the software inside the modem/router …

Member Avatar for G_Waddell
1
264

The End.