1,387 Topics

Member Avatar for
Member Avatar for Techwriter10

[I]Instant karma's gonna get you Gonna knock you right on the head ~John Lennon. [/I] It's 2009 and I'm sure the powers that be at Microsoft are hoping it's going to be a good one without any tears, but even as the old year closed, the news kept getting worse …

Member Avatar for Techwriter10
0
223
Member Avatar for happygeek

Ever wondered what the most popular passwords being used are? Ever wondered what the crappiest, most insecure passwords being used are? Hey, you are in luck as it seems the two lists are exactly the same. The What's My Pass 'Top 500 Worst Passwords of All Time' [URL="http://www.whatsmypass.com/?p=415"]list[/URL] makes for …

Member Avatar for fire_munki
0
293
Member Avatar for newsguy

According to an application vulnerability specialist, Fortify Software, HUB Computer Systems in the US has been hit by a $52,000 phone bill following the [URL="http://www.itexaminer.com/hacking-victim-hit-with-52000-phone-bill.aspx"]unauthorised access[/URL] of the company IP-enabled PBX by hackers. "The advent of IP-enabled PBXs, and the facility of remotely- programmable `conventional' PBX systems, means that hackers …

0
222
Member Avatar for happygeek

[URL="http://www.messagelabs.com"]MessageLabs[/URL] Intelligence data reveals that, in an announcement that will probably come as no shock to anyone who actually uses the Internet, the average [URL="http://www.daniweb.com/blogs/entry2459.html"]spam[/URL] level for the year managed to hit 81.2 percent. Perhaps a little more surprisingly, especially given the number of security vendor [URL="http://www.daniweb.com/blogs/entry3419.html"]warnings[/URL] throughout 2008, [URL="http://www.itwire.com/content/view/18997/53/"]malware …

0
124
Member Avatar for happygeek

Although you might think that your personal information, including your financial data, is hugely valuable to the cyber-criminal fraternity the truth would appear to be somewhat different. Security vendor [URL="http://www.trendmicro.co.uk"]Trend Micro[/URL] has published research which shows that at this time of the year, as we fast approach the climax to …

Member Avatar for sblsoftware
0
184
Member Avatar for GuyClapperton

Oh terrific. Just when we thought things were winding down for the festive season, Microsoft users are advised not to use Internet Explorer until a major security vulnerability is plugged. Clearly I agree, but I'd add a second plea - when you've cross-graded to Chrome, Firefox, Opera or whatever else, …

0
157
Member Avatar for slfisher

It's an annual event: Churches and other facilities putting out creches and other displays for Christmas find parts of it -- typically the baby Jesus -- stolen, with both a financial and a sentimental cost. Now, those facilities are equipping their baby Jesuses with GPS in order to track them …

0
138
Member Avatar for GuyClapperton

Forgive the guffaws of uncontrolled laughter from over here. I've just seen that the US Government - January Obama edition - is considering making IT security a matter for its specific attention and put someone in charge of Cybercrime. So why the laughter from the UK? Yes, I can understand …

0
144
Member Avatar for newsguy

[URL="http://www.daniweb.com/blogs/entry2289.html"]Facebook spam[/URL] is nothing news, nor for that matter is [URL="http://www.itpro.co.uk/blogs/daveyw/2008/01/03/one-million-facebook-users-exposed-to-zango-worm/"]Facebook malware[/URL]. While we are on a nothing new about Facebook theme, ever [URL="http://www.itpro.co.uk/blogs/editorial-blogs/davey-winder/922815/grownups-invade-facebook.thtml"]since grown-ups started to invade[/URL] the social network has suffered a tad from 'phoney friend syndrome.' I mean, come on, do you really think that [URL="http://www.itwire.com/content/view/20618/53/"]Barack Obama …

0
185
Member Avatar for newsguy

The IBM Internet Security Systems division, better known simply as ISS, has today warned of the 'perfect storm' of security threats which has been created by the global economic slowdown, an unprecedented level of cybercrime activity and both the cost and complexity of legal security infrastructures. ISS announced a set …

0
295
Member Avatar for GuyClapperton

The fact that Apple is now encouraging people to use antivirus software on its systems is to be welcomed. I use a Mac myself but I'm regularly disturbed by the number of fellow users who refuse utterly to use AV because 'there aren't any viruses, they're all on the PC' …

0
178
Member Avatar for slfisher

Ever had some computer malware spit a bunch of porn onto your screen? Now imagine it happening in a roomful of schoolchildren. Now imagine it could send you to jail -- for forty years. That's what happened to Julie Amero, a substitute teacher in Norwich, Conn., in 2004. Using a …

Member Avatar for slfisher
0
437
Member Avatar for slfisher

If you ever had a big brother, you know that the same guy who gave you noogies could also protect you from a bully at school -- but you had to take the bad with the good. 'Big Brother,' in surveillance, is the same way. Government surveillance is getting easier …

0
407
Member Avatar for happygeek

The United States holds many titles, some of them causes for joy while others are reason for shame. The latter category has long included 'King of Spam' being the country from which the majority of the spam on the planet originates. However, thanks to the [URL="http://www.itpro.co.uk/blogs/daveyw/2008/11/20/spammers-are-in-a-world-of-hurt/"]closure of just one spam …

0
220
Member Avatar for newsguy

What happens when your security software thinks your operating system is out to get you? Users of AVG8 discovered the answer when it decided that a Windows XP user32.dll system file was infected with a Trojan, and deleted it. Uh oh Buck, biddly biddly biddly. What happens when you delete …

Member Avatar for Anthea_123
0
197
Member Avatar for EddieC

Isn't anything safe from hackers? Now they've apparently found a way to hack into systems through a media stream, threatening users with denial of service attacks that can bring down servers and desktops alike. The vulnerability was reported yesterday by VoIPshield Laboratories, a security tools maker in Canada. The flaws …

Member Avatar for baandow
0
245
Member Avatar for happygeek

According to the fourth [URL="http://www.arbornetworks.com/report"]Worldwide Infrastructure Security Report[/URL] from Arbor Networks, published today, malicious attacks on networks are continuing to rise at an alarming rate. While that is no great surprise, the fact that during 2008 Distributed Denial of Service attacks have peaked at 40 Gbps most certainly is. Arbor's …

0
192
Member Avatar for newsguy

Hey, now that is pretty cool! Hot on the heels of a [URL="http://www.itwire.com/content/view/21585/53/"]report[/URL] suggesting that some 280 million people around the world have suffered some kind of data loss (through theft or incompetence mainly) during the last three years, Dell just might have the answer. It would appear to be …

0
152
Member Avatar for slfisher

In response to a letter signed by 40 state attorneys general, the popular classified ad site [URL="http://www.craigslist.org/about/sites"]Craigslist[/URL] has taken additional steps to keep sex workers from using its site. Left unsaid, though, is that Craigslist had little choice, unless it wished to risk being made a party to illegal activity. …

0
476
Member Avatar for happygeek

A Firefox developer has [URL="http://ehsanakhgari.org/blog/2008-11-04/dont-leave-trace-private-browsing-firefox"]revealed[/URL] that pre-release versions of Firefox 3.1 have been updated with a new feature. Officially called 'Private Browsing' it will be more familiar to many as the much talked about Porn Mode that [URL="http://www.itwire.com/content/view/20303/53/"]caused such controversy[/URL] when Microsoft announced it was being included within the forthcoming …

Member Avatar for EddieC
0
506
Member Avatar for khess

There are 5 things that every good Linux Administrator knows. Do you know what they are? They are in no particular order of importance: [B]1. Users are a Necessary Evil[/B] - Do you ever wonder why System Administrators seem so annoyed by you and your questions? It's because you are, …

Member Avatar for mebinouseph
0
507
Member Avatar for GuyClapperton

It's ironic in many ways that UK firms are asking for more help with IT security. The link is [URL="http://news.bbc.co.uk/1/hi/technology/7702823.stm"]here[/URL] but that's the basics of it - Brits aren't happy with what the Government is doing to prevent Cybercrime, particularly in the business world. Well, OK, there's always more to …

0
90
Member Avatar for happygeek

According to a new [URL="http://www.FaceTime.com/survey08/summary"]report[/URL] by FaceTime, an Internet applications control specialist, the number of data leaks and malware incidents continues to rise as employees continue to embrace the whole Web 2.0 thing within the workplace. In fact, FaceTime says, the use of such applications is so widespread that some …

0
105
Member Avatar for GuyClapperton

Here we go again. It seems like only last week (there's probably a reason for that) that I was at my desk talking about the amount of alarmist stuff about malware that's out there on the Internet. You know how it goes; someone proves in a lab that something can …

Member Avatar for jbennet
0
125
Member Avatar for happygeek

Security outfit MessageLabs today warns that as the credit crisis worsens so there has been a shift to the online arena for making money via spoofing banks for phishing scams. Between August and September this kind of phishing attack grew by 16 percent, but during September and October it has …

0
234
Member Avatar for newsguy

Sex on the Internet is nothing new, in fact it has been one of the great unspoken drivers of ecommerce and ecommerce technology over the years. Selling stuff on the Internet is nothing new, it too has been pivotal in driving online development. In particular, when you think of eBay …

0
173
Member Avatar for happygeek

The quick answer is no, at least according to well respected security guru and Chief Research Officer at F-Secure, Mikko Hypponen. The slightly longer answer is that dealing with organised crime on the Internet is not as easy as you might imagine, and bringing cyber criminals to justice can be …

0
152
Member Avatar for slfisher

The group [URL="http://www.stopinternetpredators.org/"]Stop Internet Predators[/URL], claiming that the Street View 360-degree technology can be used by pedophiles to help stalk their victims, is recommending that municipalities "[b]an Street View from your neighborhoods until it is safeguarded to ensure children's safety and privacy." How Google is supposed to do that, the …

Member Avatar for Ezzaral
0
486
Member Avatar for Lisa Hoover

The New York Times ran an in-depth article recently detailing the [URL="http://www.nytimes.com/2008/10/13/technology/business-computing/13thin.html?partner=rssnyt&emc=rss"]impact of thin client technology in the workplace[/URL]. The story takes a look at the reasons why the idea has had trouble getting off the ground during the last 15 years, and why it's suddenly gaining traction now. Author …

Member Avatar for OlyComputers
0
125
Member Avatar for slfisher

Last Saturday, Republican vice presidential nominee and Alaska Governor Sarah Palin held a rally in Los Angeles in the Home Depot Center, and the California Democratic Party rented a giant electronic billboard during the event, and solicited questions from people, via texting, to display during the presentation (exhorting submitters to …

0
118

The End.