1,390 Topics

Member Avatar for
Member Avatar for happygeek

Last year I [URL="http://www.daniweb.com/blogs/entry1466.html"]exposed[/URL] a security breach involving the online collection of applications for visa documents allowing Indian citizens to visit the UK, an expose that ended up with the [URL="http://www.daniweb.com/blogs/entry1817.html"]UK government itself being found guilty[/URL] of breaking the Data Protection Act and which kick-started something of a sea change …

0
181
Member Avatar for newsguy

The [URL="https://www.blackhat.com/"]Black Hat[/URL] security conferences are always good for a crowd pleasing demonstration or two, and security researcher Adam Laurie was happy to oblige at the latest DC based event. In a 'look no hands' fashion, he was able to pull up account data including name, account number and expiration …

Member Avatar for waltaugust
0
382
Member Avatar for happygeek

It is not often that a drunken discussion provides anything more than a hangover the following morning, but recently a bunch of IT security experts got talking while the beer was flowing and someone asked the question: what is the biggest threat on the IT landscape today? Everything from 'the …

0
179
Member Avatar for newsguy

Who could forget [URL="http://en.wikipedia.org/wiki/Jon_Lech_Johansen"]DVD Jon[/URL], the Linux guru who was co-author of DeCSS? This Linux application 'unlocked' DVDs with content otherwise protected by Content Scrambling System (CSS) encryption and landed DVD Jon in front of a judge. Which did not stop him from continuing his quest to free audiovisual content …

Member Avatar for trueorfalse9
0
237
Member Avatar for happygeek

It has been estimated that something in the region of 70 percent of the ATMs in current use are based not on the proprietary hardware, software and communication protocol platforms of old but instead on PC/Intel hardware and commodity operating systems, the most popular being Windows XP embedded. In fact, …

Member Avatar for ShaneW
0
1K
Member Avatar for happygeek

IT security and control outfit [URL="http://www.sophos.com"]Sophos[/URL] has revealed the results of a poll that shows the number of people who believe that Apple Macs will be increasingly targeted by cybercriminals in the future has risen from 79 percent two years ago to 93 percent now. Sophos undertook the poll as …

0
103
Member Avatar for Michael_Knight

[B]Rumors and speculation about why five undersea cables to the Middle East have been severed — and what it means for IT security[/B]. Since [B]Jan. 30, 2008,[/B] there has been a troubling pattern of underwater anarchy. At first, it was reported that two, then three, then five undersea [URL="http://en.wikipedia.org/wiki/Fiber-optic"]fiber-optic[/URL] cables …

0
341
Member Avatar for happygeek

Security researchers at [URL="http://www.sophos.com"]Sophos Labs[/URL] have revealed that nearly 70 percent of all Linux honeypot infections are caused by a single virus. Perhaps even more shocking, all things considered, is the fact that the virus in question, Linux/Rst-B, is actually six years old now. So concerned is Sophos at this …

0
199
Member Avatar for Michael_Knight

[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It …

Member Avatar for Elina Tsai
0
355
Member Avatar for happygeek

It has been a couple of months now since a Russian security researcher, Evgeny Legerov, confirmed that the widely deployed media software RealPlayer was vulnerable to a zero-day exploit. The Russian company, Gleg, is in the business of selling information on such exploits and security flaws. Unfortunately, according RealNetworks's Vice …

Member Avatar for MattEvans
0
303
Member Avatar for Michael_Knight

In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and …

0
282
Member Avatar for happygeek

Oh the irony. Windows Vista Service Pack 1 is, quite rightly, being pushed hard on the merits of the numerous security improvements over the original release. However, despite the fact that Vista SP1 will not be made available to end users until March, because it has just been released to …

0
84
Member Avatar for happygeek

Today sees the official formation of the Anti-Malware Testing Standards Organization ([URL="http://www.amtso.org"]AMTSO[/URL]) which has come about following an industry wide concern about the lack of any real-world standards that apply to anti-malware solutions when it comes to testing. Why is this important? Because unless the testing methodologies used to evaluate …

Member Avatar for jwenting
0
157
Member Avatar for newsguy

It has been a long time coming, but a virus writer has finally been arrested by the Japanese authorities. According to security specialists [URL="http://www.sophos.com"]Sophos[/URL] law enforcement agencies in Kyoto, Japan, have arrested three men who stand accused of plotting to infect users of a popular P2P file-sharing network with a …

Member Avatar for Chaky
0
251
Member Avatar for happygeek

A CIA analyst speaking at the SANS 2008 SCADA and Process Control Summit in New Orleans has admitted that hackers have not only been able to penetrate the power grids of several countries, but also successfully cut power to several cities, all from the relative safety of the Internet. Central …

Member Avatar for rabbit1840
0
317
Member Avatar for happygeek

The Fortinet [URL="http://www.fortiguardcenter.com"]threat response team[/URL] has reported a new and malicious Symbian OS based worm that is currently actively infecting mobile phone networks. According to Fortinet, the worm comes packaged in disguise as a multimedia file with a name such as sex.mp3 or love.rm and enables it to easily con …

0
185
Member Avatar for newsguy

It doesn’t really matter where you live in the world, the chances are that your country has been hit by some high profile data loss scandal during the course of the last year or so. Everything from retail operations such as TJ Maxx losing the odd 40 million or so …

0
143
Member Avatar for happygeek

Many years ago, during a press visit to Microsoft HQ in Seattle, I was given relative freedom to wander around the Redmond campus. Of course, there were some areas that were strictly out of bounds. Areas like the one which was entered via the 'Cryogenics Lab' door for example. At …

Member Avatar for Thinka
0
225
Member Avatar for newsguy

A posting at [URL="http://seclists.org/dailydave/2008/q1/0000.html"]Daily Dave[/URL], which is part of the [URL="http://insecure.org/"]Insecure.org[/URL] security website, by the founder of a Moscow based security vendor called [URL="http://www.gleg.net"]Gleg[/URL], would suggest that it's not a very good start to the new year for RealPlayer 11 users. Gleg Ltd chief technology officer Evgeny Legerov made a …

0
137
Member Avatar for happygeek

Kaspersky Lab has [URL="http://www.viruslist.com/en/analysis?pubid=204791980"]published its list[/URL] of the most prevalent viruses for the end of 2007, and although an email worm retains the top spot the more interesting stuff is happening immediately below it in the rankings of shame. Specifically, the second, fourth and seventh places which are all occupied …

Member Avatar for just2rock
0
294
Member Avatar for newsguy

In an interview with Australian publication [URL="http://www.computerworld.com.au/index.php/id;1891124482;pp;1;fp;16;fpid;1"]Computerworld[/URL] and ahead of his appearance as a keynote speaker at the Australian Linux Conference 2008, renowned security expert Bruce Schneier has compared Linux to Star Wars and suggests fanboys feel the force a bit more. Schneier will give a presentation entitled "Reconceptualising Security" …

0
132
Member Avatar for happygeek

According to security researchers at [URL="http://news.bitdefender.com"]BitDefender[/URL] a new Trojan has been discovered which hijacks text based Google adverts and replaces them with ads from a totally different provider. Trojan.Qhost.WU acts by modifying the infected computers' Hosts file to include a line which redirects the web browser from the expected .googlesyndication.com …

0
253
Member Avatar for Brian.oco

Yesterday I wrote that Google was ranked dead last in a national survey of Internet search engine companies when it comes to consumer privacy rights. I also notes how Congress was taking a closer look at Google's privacy practices, particularly in light of its proposed merger with Doubleclick. Now it …

Member Avatar for sidfilmz
0
245
Member Avatar for Brian.oco

A recent study on the privacy rankings of big internet search engine providers reveals that Google might have some ‘splainin to do, especially if Congress gets its way. In the process, its proposed merger/buyout with Doubleclick might be in trouble. First, Google’s privacy problems, as defined by some privacy experts. …

Member Avatar for happygeek
0
212
Member Avatar for happygeek

[URL="http://www.nochex.com"]Nochex[/URL] has been providing secure online payment services to small and medium businesses in the UK ever since 2001. It seems to take security seriously, as anyone dealing with your money should, with encrypted data transfers, encrypted data storage and servers at the same highly secure location as used by …

0
190
Member Avatar for newsguy

Nick Breese is a researcher with New Zealand based security outfit [URL="http://security-assessment.com/"]Security-Assessment.com[/URL] and found himself giving a presentation at the Kiwicon hacker conference in Wellington earlier this week. His presentation looked at the use of the PlayStation 3 games console to crack passwords, and Breese concluded that when compared to …

Member Avatar for Games
0
938
Member Avatar for happygeek

The annual [URL="http://www.mcafee.com"]Virtual Criminology Report[/URL], published today, warns that international international cyber espionage is set to be the biggest single threat to national security next year. Right there on the front line of this cyber cold-war is China, according to report authors McAfee. However, that is just the tip of …

0
185
Member Avatar for happygeek

I have two mobile phones. One is purely for personal calls and so that number is only known to my family and closest friends. The other is purely for business calls, the number is printed on my business. A couple of times last week I received what are known as …

0
177
Member Avatar for newsguy

The security experts at [URL="http://www.avertlabs.com"]McAfee's Avert labs[/URL] have been consulting the Tarot card, rubbing their crystal balls and generally predicting what levels of IT doom and gloom we can expect to be experiencing during the course of 2008. Unsurprisingly, they expect to see an increase in web exploits and those …

Member Avatar for jwenting
0
232
Member Avatar for happygeek

Back in May, I [URL="http://www.daniweb.com/blogs/entry1466.html"]broke the story[/URL] on DaniWeb in this very blog of how the online application facility for UK visas was not only insecure, but that it had potentially been so for years. The company concerned, VFS Global, which operated the visa online application form filing service on …

Member Avatar for Dani
1
447

The End.