Forum latest

Computer Security
Hackers pay 43 cents per hijacked Mac
Written by Daniel   
Friday, 25 September 2009 18:17

Russian cyber crime gangs after Apple's Macs, too, says researcher

By Gregg Keizer
September 25, 2009 01:58 PM ET
Computer World

Computerworld - A network of Russian malware writers and spammers paid hackers 43 cents for each Mac machine they infected with bogus video software, a sign that Macs have become attack targets, a security researcher said yesterday.


Up To 9 Percent Of Machines In An Enterprise Are Bot-Infected
Written by Daniel   
Friday, 25 September 2009 18:01

Most are members of tiny, unknown botnets built for targeting victim organizations

Sep 24, 2009 | 03:59 PM
By Kelly Jackson Higgins

Bot infections are on the rise in the enterprise, and most come from botnets you've never heard of nor ever will.

In a three-month study of more than 600 different botnets found having infiltrated enterprise networks, researchers from Damballa discovered nearly 60 percent are botnets that contain only a handful to a few hundred bots built to target a particular organization. Only 5 percent of the bot infections were from big-name botnets, such as Zeus/ZDbot and Koobface.     [Comments...]

Seagate to ship self-encrypting hard drives
Written by Danrok   
Thursday, 24 September 2009 14:55

From The Inquirer:

Seagate has released several new hard drives that feature self-encryption as standard.

Microsoft Ups The Ante In Fight Against Rogue Antivirus
Written by Daniel   
Tuesday, 22 September 2009 17:35
As prevalence of rogue antivirus attacks intensify, Microsoft takes legal action against 'malvertisers'

Sep 21, 2009 | 05:50 PM
By Kelly Jackson Higgins

Microsoft has taken a hard line on malicious online advertisers -- also known as "malvertisers" -- by filing five lawsuits against the suspected fraudsters in what the software giant claims are the first-ever legal moves against malvertising. The software giant's suits came on the heels of a rogue antivirus attack on the high-profile New York Times' Website, where what was purported to be a Vonage ad on the Grey Lady turned out to be malware that served readers fake warnings that their computers were infected, along with a link to "antivirus software" they must purchase to clean them up. [Comments...]
SANS Report: 60% Of All Attacks Hit Web Applications, Most in the U.S.
Written by Daniel   
Tuesday, 15 September 2009 17:15
New attack data shows organizations are missing the mark in their security priorities as client-side application flaws, Web flaws dominate as attack vectors

Sep 15, 2009 | 10:23 AM
By Kelly Jackson Higgins

Enterprises worldwide are focusing their efforts on the wrong threats, leaving their organizations wide open to Web and client-side attacks, according to a new report released today by the SANS Institute. [Comments...]
Microsoft Fixes Eight Flaws, But Three Remain Open
Written by Daniel   
Wednesday, 09 September 2009 12:20
The September patch set from Microsoft has fallen a bit short, leaving three zero-day vulnerabilities open to be exploited

By Thomas Claburn
September 8, 2009 05:25 PM

Microsoft (NSDQ: MSFT) on Tuesday released five Security Bulletins addressing eight vulnerabilities, but left three zero-day vulnerabilities untended.
Paul Henry, forensic and security analyst for Lumension, said in an e-mail that the three zero-day vulnerabilities need to be addressed soon. Two are IIS vulnerabilities that were made public when exploit code was posted online about a week ago. The third is a vulnerability affecting Microsoft SMB2, for which exploit code was posted on Monday. [Comments...]
University Research Exposes Potential Vulnerabilities In Cloud Computing
Written by Daniel   
Wednesday, 09 September 2009 12:13

    'Cross-VM attacks' could threaten sensitive data in shared environments, researchers say

Sep 08, 2009 | 05:14 PM
By Tim Wilson

Users of cloud computing infrastructures should be aware that their sensitive data could be potentially leaked, a group of university researchers say.
In a new research paper (PDF), several computer scientists from the University of California at San Diego (UCSD) and the Massachusetts Institute of Technology (MIT) say they have discovered soft spots in the cloud computing concept that could leave data vulnerable to attack.

"Overall, our results indicate that there exist tangible dangers when deploying sensitive tasks to third-party compute clouds," the paper says. [Comments...]

'Freakshow' Provides Inside Look At Real Malware Behind Big Breaches
Written by Daniel   
Tuesday, 01 September 2009 11:26
   Forensic specialists who investigated hacks of a hotel chain, casino, and restaurant share details on the sophisticated malware used to successfully steal confidential data

Aug 31, 2009 | 04:56 PM
By Kelly Jackson Higgins

They planted malware that siphoned data from memory, deployed a bot, and camouflaged a keylogger, but all three of these real attacks were after the same thing: credit and debit-card data.  [Comments...]
New attack cracks common Wi-Fi encryption in a minute
Written by Daniel   
Friday, 28 August 2009 10:37
   Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute.

By Robert McMillan
August 27, 2009 02:21 AM ET

The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, who plan to discuss further details at a technical conference set for Sept. 25 in Hiroshima.  [Computer World...]    [Comments..]
Bill would give president emergency control of Internet
Written by Daniel   
Friday, 28 August 2009 10:30
   Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector computers from the Internet.

 August 28, 2009 12:34 AM PDT
by Declan McCullagh

They're not much happier about a revised version that aides to Sen. Jay Rockefeller, a West Virginia Democrat, have spent months drafting behind closed doors. CNET News has obtained a copy of the 55-page draft (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency.

<< Start < Prev 11 12 13 14 15 16 17 18 19 20 Next > End >>

Page 19 of 28

See also

None found.

Hardware | Windows | Linux | Security | Mobile Devices | Gaming
Tech Business | Editorial | General News | folding@home

Forum | Download Files

Copyright ©2001 - 2012, AOA Forums.  All rights reserved.

Alliance of Overclocking Arts

Links monetized by VigLink

Don't Click Here Don't Click Here Either