1,390 Topics
| |
According to IM services provider [URL="http://www.process-one.net"]ProcessOne[/URL] a staggering 72 percent of UK businesses have banned the use of IM software such as MSN and AIM citing security fears as the main reason. At the same time, some 75 percent of those businesses admit that IM could be a valuable collaboration … | |
Security researchers within the Marshal TRACE Team have [URL="http://www.marshal.com/trace/traceitem.asp?article=714"]warned[/URL] that malicious spammers are using fake United Parcel Service invoices in order to deliver a malware payload. Always looking for a new and convincing hook to snare the unsuspecting user into downloading malicious components from the web, this new attack utilises … | |
The Advanced Research Team of security tools vendor Ounce Labs has identified two vulnerabilities in the Spring framework for Java. The vulnerabilities have the potential, the team says, to allow an attacker to “subvert the expected application logic and behavior,” and gain control of an application and access any personal … | |
Following on from [URL="http://www.daniweb.com/blogs/entry2739.html"]my posting[/URL] two days ago, the [URL="http://www.eff.org/deeplinks/2008/07/viacoms-statement-youtube-user-data-controversy"]EFF is reporting[/URL] that Viacom has issued a statement regarding the US court ruling over disclosure of those YouTube video viewing logs. Here is the statement in full: [QUOTE]It is unfortunate that we have been compelled to go to court to … | |
According to a [URL="http://www.theregister.co.uk/2008/07/04/iphone_security_patch_lag/"]report[/URL] at The Register Apple is failing to keep iPhone software up to date with security patches. This despite the iPhone 1.1.4 software being nothing more than a "pared-down version of Mac OS 10.5" it says. The Jesus Phone is said to be vulnerable to a number … | |
[URL="http://www.theinquirer.net/gb/inquirer/news/2008/07/04/hundreds-thousands-laptops-left"]According to The Inquirer[/URL] a new report by the Ponemon Institute, rather appropriately sponsored by Dell, has revealed that an astonishing number of laptops are lost at airports across the United States on a weekly basis. Asking questions of 800 business travellers at some 106 major airports in the US, … | |
Sometimes I am left almost loss for words, and today is one of them. Judge Louis Stanton gave a ruling in the federal court for the Southern District of New York which has, quite frankly, dismissed the right to privacy of anyone who has ever watched a video clip on … | |
It’s been more than 10 days since the latest AppleScript.THT Trojan horse for Mac OS X reared its ugly head, yet still no word or fix from Apple. The new threat to versions 10.4 and 10.5 is classified as critical by the SecureMac security site, exploits a hole in the … | |
Heads up users of Yahoo Mail. A cross-site scripting vulnerability has been discovered that could allow hackers to steal a user’s session IDs and ultimately private information, according to [URL=http://blog.cenzic.com/public/item/207752]a report[/URL] yesterday from security risk assessment firm Cenzic. In an excerpt from the Cenzic blog post, the company reports: “If … | |
Remember the big fuss that spread all over the world when HM Revenue and Customs, the UK government department that deals with income tax and the like, managed to lose discs containing the financial details of 25 million people? amazingly, the official Independent Police Complaints Commission enquiry into the shameful … | |
Sandro Gauci, founder of [URL="http://enablesecurity.com"]EnableSecurity[/URL], has revealed that six years on from his 2002 report into extended HTML form attacks the problem has simply refused to go away. The original report included details of how attackers could abuse non-HTTP protocols in order to launch Cross Site Scripting attacks, even in … | |
[URL="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/"]Multiple arbitrary code execution vulnerabilities in Ruby[/URL] have been revealed by the [URL="http://www.apple.com/support/security/"]Apple Product Security[/URL] team which could lead to Denial of Service attacks. A total of five vulnerabilities have been reported, with versions impacted being: [INDENT]1.8.4 and all prior versions 1.8.5-p230 and all prior versions 1.8.6-p229 and all prior … | |
Amazingly, according to [URL="http://www.theinquirer.net/gb/inquirer/news/2008/06/20/teen-faces-years-hacking"]The Inquirer[/URL], an Orange County hacker is facing an incredible 38 years in prison if found guilty of several counts relating to hacking into his school computer. It seems that Omar Khan, 18, of Coto de Caza, California hacked into computer in order to change his grades. … | |
Not my sentiment but that of Johnathan Nightingale, the Firefox security interface designer no less who has [URL="http://news.cnet.com/8301-10789_3-9967829-57.html"]gone on record[/URL] as saying that "we didn't want to put in something that was half baked" when talking about how the privacy button might interact with websites and mashups alike. Which might … | |
Fellow DaniWeb blogger Guy Clapperton [URL="http://www.daniweb.com/blogs/entry2585.html"]makes some excellent points[/URL] about why, as a "self-employed Mac user," he bought himself a new iPhone following yesterday's announcement of the new 3G model. Are there any compelling reasons to get a new iPhone if you're a corporate employee or business owner, though? Actually, … | |
[URL="ttp://www.kaspersky.com"]Kaspersky Lab[/URL] is warning the public at large to be on the lookout for a new version of the blackmail virus Gpcode which has started to appear in the wild. This particularly nasty twist on the virus format encrypts your files using an RSA encryption algorithm, this time with a … | |
[URL="http://www.verdict.co.uk"]Verdict Research[/URL] has published a report which suggests that the credit crunch is benefiting web-based businesses as consumers in the UK flock to the Internet in search of money saving bargains. With £15bn ($30bn) spent online by UK consumers in the last 12 months, [URL="http://www.startups.co.uk/6678842909857992097/online-sales-rise-by-a-third.html"]according to the research[/URL], this equates … | |
[I]Even on a slow day, I can have a three-way chat with two women at the same time -- Brad Paisley, [URL="http://www.youtube.com/watch?v=7GcVnhNjWV0"]Cooler Online[/URL][/I] But what if you work for the government? Particularly if you're a teacher? A number of [URL="http://www.sun-sentinel.com/news/local/southflorida/sfl-flpfacebook0601pnjun01,0,7309360.story?page=1&track=facebook"]teachers in Palm Beach County[/URL], Fla. -- some of them 20somethings … | |
Google would argue that it does not need to make the privacy policy it has any easier to find, after all you only have to click the 'About Google' link on the homepage and then go and click the 'Privacy Policy' link that can be found at the foot of … | |
The [URL="http://www.oecd.org/dataoecd/53/34/40724457.pdf"]Malicious software (malware): a security threat to the Internet economy[/URL] report published by the Organisation for Economic Co-operation and Development over the weekend suggests that the PC malware infection rate in the US has hit 25 percent. These OECD cybercrime infection findings are highly disturbing, admits Geoff Sweeney, CTO … | |
According to reports the most serious forthcoming threats to IT security will be revealed during the Gartner Security Summit in Washington this coming week, and it looms like the consumerization of IT will be right there front of stage. Something that Gartner research fellow, John Pascatore, describes as the Gen … | |
Mac OS X is safer today than it was Tuesday, thanks to Apple. The company on Wednesday posted [URL= http://support.apple.com/kb/HT1141]Security Update 2008-003[/URL], containing forty one performance and security fixes for the enhanced Active Directory, AirPort, iChat, Mail, Time Machine and several other components of the company’s operating system. It also … | |
[URL="http://searchsecurity.techtarget.com.au/articles/24758-Telstra-distributes-malware-infected-USB-drives-at-AusCERT"]Reports are filtering through[/URL] that delegates at the annual Australian AusCERT security conference were given USB sticks replete with malware. It would appear that the Oz telco Telstra handed out the memory sticks, unware of the malware payload, during a security tutorial of all things. The malware apparently took advantage … | |
In a [URL="http://www.computerworld.com.au/index.php/id;649220418;fp;16;fpid;1"]comprehensive review[/URL] of the new ZonaAlarm virtualized security environment that is ForceField, Roger Grimes praises the elegant user interface. While admitting to being a big fan of Check Point and the ZoneAlarm brand, Grimes remains skeptical of these kind of virtualization products and it would appear with good … | |
According to the UK government, new proposals within the [URL="http://www.commonsleader.gov.uk/output/page2461.asp"]Communications Data Bill[/URL] are being put forward in order to prevent and detect crime as well as protect national security. The government argues that unless legislation is amended to reflect changes in technology, the ability of public authorities to counter criminal … | |
Have you ever wondered exactly how a botnet works? A wotnet, you ask? A botnet, I say. You know, the thing that your computer might well be a part of, without your knowledge or approval, which is used to launch distributed denial of service attacks, send spam, distribute malware and … | |
According to security experts [URL="http://www.sophos.com"]Sophos[/URL] a man has been arrested after allegedly trying to sell a hard drive which had previously belonged to Formula One racing driver Adrian Sutil and contained personal and financial data. The police in Germany are said to be questioning the man regarding a blackmail attempt … | |
A report entitled "[URL="http://ece.uprm.edu/~andre/insert/gmail.html"]Exploiting the Trust Hierarchy among Email Servers[/URL]" published by Pablo Ximenes from the University of PR at Mayaguez, USA and Andre dos Santos at the State University of Ceara, Brazil suggests that Google Mail is flawed in such a way so as to turn it into massive … | |
It has emerged that Belgium is the latest country to feel the force of the Chinese cyber-super-power, with [URL="http://english.ohmynews.com/articleview/article_view.asp?at_code=434212"]Belgian ministers claiming[/URL] that state sponsored hackers have been targeting Federal Government computers. The Justice Minister in Belgium, Jo Vandeurzen, has claimed that the spate of hacking attacks also reported to parliament … | |
Here's a good one, [URL="http://www.guardian.co.uk/world/2008/may/01/italy"]according to The Guardian newspaper[/URL] in the UK, the incomes of each and every single Italian citizen were published for each and every other Italian citizen to see on the web. Rather than being some terrible data breach, or the work of some sinister hacker, it … |
The End.