Forum latest

Computer Security
New Facebook blog: We can hack into your profile
Security
Written by Daniel   
Monday, 22 June 2009 11:19

Well, here's an innovative way to get some buzz: FBHive

Caroline McCarthy
June 22, 2009 8:08 AM PDT

 a new blog devoted to the discussion of all things Facebook, has debuted with the revelation that its creators have discovered a hack that can expose some crucial profile data.

No, it won't expose your personal photos or wall posts. But, FBHive says, it can bring up all the "basic information" that you have entered into your profile, even if you've elected to keep that information private. This is the section that includes location, gender, relationship status, relationships (significant other, parents, siblings), political views, religious views, birthday, and hometown. That's enough to be a problem in the identity theft department, as it could easily expose frequent password hints like dates of birth and mothers' maiden names. [C/Net News....]   [Comments....]

 
Sweden: IP numbers are personal...unless you're a pirate
Security
Written by Danrok   
Thursday, 18 June 2009 13:18

From The Register:

A ruling from a Swedish court that IP numbers should be considered personal data will not have any impact on the country's recently passed anti-piracy law.

Read more...
 
Hactivist DDoS Attacks In Iran Trigger Worries Of Wider Internet Crackdown
Security
Written by Daniel   
Thursday, 18 June 2009 12:00
Experts warn that protest distributed denial-of-service attacks could backfire

Jun 17, 2009 | 05:39 PM
By Kelly Jackson Higgins
DarkReading

Security experts are warning U.S. citizens and others not to join Iranian opposition hacktivists for fear that continued distributed denial-of-service (DDoS) attacks against Iranian government and other Websites will backfire and prompt Iranian officials to cut off the country's outside Internet access altogether.

Reports that the Iranian government had begun throttling back Internet bandwidth and limiting access to Websites have emerged during the past few days in the wake of protests from Iranian citizens about the recent election of President Ahmadinejad, who was declared the winner over Mir Hossein Mousavi in Iran's national presidential run. Protesters have been DDoSing government-sponsored sites, mainly getting out the word through Twitter and other social networking sites via proxy servers. [Comments...]
 
China 'Green Dam' Censorware Called Security Risk
Security
Written by Daniel   
Monday, 15 June 2009 11:08
Chinese authorities claim the software is necessary to protect people from pornography, but the software has been found to block politically sensitive terms.

By Thomas Claburn
InformationWeek
June 12, 2009 06:14 PM

China's plan to require Web filtering software on all PCs sold in the country after July 1 continues to draw fire from individuals and organizations inside and outside the country.

Three computer scientists with the University of Michigan on Thursday published an analysis of the "Green Dam Youth Escort" software required by the Chinese government and found that "it contains serious security vulnerabilities due to programming errors."  [Comments...]
 
Microsoft Fixes Record Number Of Vulnerabilities
Security
Written by Daniel   
Wednesday, 10 June 2009 11:12
The company's June Patch Day included 10 security bulletins to fix 31 threats in Microsoft products.

By Thomas Claburn
InformationWeek
June 9, 2009 04:50 PM

Microsoft (NSDQ: MSFT) on Tuesday released a substantial set of software patches, addressing 31 vulnerabilities with 10 security bulletins.

That's the largest number of vulnerabilities fixed in a single day since the company began issuing regular patches on the second Tuesday of every month in October 2003. The company's June Patch Day includes six bulletins designated "critical," three "important," and one "moderate."

Affected software includes: Active Directory on Microsoft Windows 2000 Server and Windows Server 2003; Active Directory Application Mode when installed on Windows XP Professional and Windows Server 2003; Windows Print Spooler; Internet Explorer; Microsoft Office Word; Microsoft Office Excel; Microsoft Works Converters; Windows remote procedure call; Windows kernel; Microsoft Internet Information Services; and Windows Search. [Comments...]
 
Hackers Arrested In China After Feud Causes Major Outage
Security
Written by Daniel   
Tuesday, 09 June 2009 11:38
DDoS feud between underground gaming services allegedly caused temporary Internet outage across more than 20 provinces

Jun 04, 2009 | 04:55 PM
By Tim Wilson
DarkReading

Four individuals have been arrested in China after an alleged denial-of-service "war" between underground gaming services spun out of control, according to news reports.

According to a report by Xinhua News Agency, China's Ministry of Public Security said Tuesday that the suspects were detained on May 29 following police investigations in the Jiangsu, Zhejiang, and Guangdong provinces. The suspects were not named, although the surnames of two -- Xu and Wang -- were released. [Comments...]
 
French military closes Bit Torrent site
Security
Written by Danrok   
Monday, 08 June 2009 10:46

From The Inquirer:

THE FRENCH MILITARY moved to close down a large Bit Torrent tracker in what is the first recorded use of a nation's armed forces under the control of the entertainment industry.

Read more...
 
Study: Web Trackers Systematically Compromise Users' Privacy
Security
Written by Daniel   
Thursday, 04 June 2009 11:58

Website monitoring practices take advantage of many loopholes in privacy regulations, UC-Berkeley study says

Jun 03, 2009 | 01:11 AM
By Tim Wilson
DarkReading

 Do you know who's tracking you when you're surfing the Web -- and what they do with the information? A new study suggests you may not know as much as you think.
The study by researchers at the University of California-Berkeley (PDF), which was released late Monday, indicates that Web users may be tracked ("bugged," as the researchers put it) by dozens of sources on a visit to a single site. In a single month, they found 100 monitoring agents on one site, blogspot.com.

While many of the trackers used on blogging sites are low-level monitors used by bloggers to see who's reading their content, the big companies -- such as Google -- are also tracking a large portion of Web traffic, the report says. "We found five trackers overall operated by Google, including Analytics, DoubleClick, AdSense, FriendConnect, and Widgets," the researchers say. [Comments...]

 
Obama Announces New Cybersecurity Direction
Security
Written by Daniel   
Friday, 29 May 2009 11:36

   U.S. President Barack Obama will appoint a government-wide cybersecurity coordinator and elevate cybersecurity concerns to a top management priority for the U.S. government, he announced Friday.

Grant Gross, IDG News Service, PC World
May 29, 2009 9:30 am

The White House will also develop a new, comprehensive national cybersecurity strategy, with help from private experts, and it will invest in "cutting edge" cybersecurity research and development, Obama said in a short speech.
The U.S. government, businesses and utilities face cyberattacks constantly, Obama said. "It's now clear that this cyberthreat is one of the most serious economic and national security challenges we face as a nation," he said. "It's also clear that we're not as prepared as we should be, as a government, or as a country." [Comments...]

 
More Than 80% Of Phishing Attacks Use Hijacked, Legitimate Websites
Security
Written by Daniel   
Thursday, 28 May 2009 10:59
New research from the Anti-Phishing Working Group shows how phishers are better covering their tracks -- and what to do when phishers compromise your Website

May 27, 2009 | 04:23 PM
By Kelly Jackson Higgins
DarkReading

It used to be that researchers could sometimes track a phishing exploit by the notorious cybercrime ring behind it, like the Rock Phish gang, but no more: New research from the Anti-Phishing Working Group (APWG) has found that most phishers are setting up shop on legitimate Websites to be inconspicuous when they steal valuable information from victims.  [Comments...]
 
<< Start < Prev 21 22 23 24 25 26 27 28 Next > End >>

Page 23 of 28

See also

None found.


Hardware | Windows | Linux | Security | Mobile Devices | Gaming
Tech Business | Editorial | General News | folding@home

Forum | Download Files

Copyright ©2001 - 2012, AOA Forums.  All rights reserved.

Alliance of Overclocking Arts

Links monetized by VigLink

Don't Click Here Don't Click Here Either