1,118 Topics

Member Avatar for
Member Avatar for happygeek

If you were asked to paint a verbal picture of the Internet in just five words, would they be porn, drugs, spam, Twitter and zombies? After analyzing an amazing two billion emails a day for three months, that's the image arrived at by one research outfit. [attach]15822[/attach]The latest [URL="http://www.commtouch.com/download/1753"]Internet Threat …

Member Avatar for GrimJack
0
430
Member Avatar for Vincentas

EDIT: links fixed Hello guys ! Alot of people today want or actually have a website. But do they really understand the possible risks and dagers on the internet? You can never know when hackers or other institutions will target you, and people do not realize that your personal information …

Member Avatar for M.Ledovich
1
264
Member Avatar for happygeek

New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about …

Member Avatar for LastMitch
2
440
Member Avatar for happygeek

Global online cash provider [Ukash](http://www.ukash.com), founded in 2001 and with a presence in more than 50 countries across 6 continents, has warned users not to get scammed by a loan company con doing the rounds at the moment. Ukash works on a code basis, with the user buying a voucher …

Member Avatar for LastMitch
0
484
Member Avatar for happygeek

Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and …

1
377
Member Avatar for sharma.chiragfaith

I have created an online PHP code executor at http://web.guru99.com Though I have checked all security aspects … do you experts see any major flaw that I need to care of?

Member Avatar for cereal
0
215
Member Avatar for happygeek

Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s …

Member Avatar for LastMitch
2
365
Member Avatar for ing

Hello. I'm trying to set up a private section of my website for testing and I'm having a problem where my .htaccess / .htpasswd protection always rejects my password. I've set permissions to 604 on both files as recommended by my web host and both files reside in the same …

Member Avatar for cereal
0
408
Member Avatar for happygeek

The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing …

Member Avatar for analyzea
2
495
Member Avatar for happygeek

The latest VIPRE Report from [GFI Labs](http://www.gfi.com) suggests that 2013 started off as a bad year for social network-based cybercrime attacks. The report, which analysed the ten most prevalent threats detected during the month of January, identified phishing messages on both Twitter and Facebook as well as malicious spam messages …

Member Avatar for expensetracker
2
490
Member Avatar for fheppell

I have a snippet of mysql which is filled in with two variables: SELECT `download` FROM `images` WHERE `owner_un`='$owner' AND `url`='$url' The `$url` variable comes directly from a URL variable. This input should only ever contain alphanumeric characters, if this helps. Thanks for any help

Member Avatar for fheppell
0
210
Member Avatar for Cheeve

Hello, I am curious about how to root an Android phone without using any one click methods. A Google search returns only how to use programs to do this for you. Obviously there is a security vulnerability that is exploited, but I'd like to know in detail how this is …

Member Avatar for CimmerianX
0
391
Member Avatar for happygeek

Dana Tamir, Enterprise Security Director for [Trusteer](http://www.trusteer.com/) has recently uncovered a variation of the TorRAT banking data malware which has been actively configured to target Twitter users. The attack works by "injecting Javascript code into the victim’s Twitter account page" Tamir says, adding that the malware "collects the user’s authentication …

Member Avatar for diafol
2
383
Member Avatar for happygeek

That dramatic statement pretty much sums up the feelings of many people taking part in a recent survey. They suggest that online banking and online shopping are akin to playing Russian Roulette and it is only a matter of time before their security, credit cards and bank balances are breached. …

Member Avatar for medmainfomatix
0
442
Member Avatar for happygeek

The UK Information Commissioner's Office (ICO) has slapped the Greater Manchester Police force with a £150,000 fine (reduced to £120,000 for early payment) after a memory stick containing sensitive data about serious crimes was stolen from the home of a police officer. ![dweb-police](/attachments/small/0/dweb-police.jpg "align-right") The ICO has the power to …

Member Avatar for LastMitch
1
348
Member Avatar for happygeek

Think of apps and you probably think of your smartphone. After all, Apple pretty much built an iPhone empire around the concept of apps and users of Android and Windows handsets are just as hooked. Truth be told though, and this 'Age of Apps' has spread far beyond the smartphone …

Member Avatar for LastMitch
1
476
Member Avatar for EvolutionFallen

A client of mine wants to implement SSL on their site. They have a number of forms which communicate sensitive/personal information, and want to send the data over a secure channel. I've worked with sites that have SSL certificates already, but never actually implemented one myself. The site runs on …

Member Avatar for EvolutionFallen
0
362
Member Avatar for happygeek

New research published today by security vendor ZoneAlarm, the Facebook Child Safety Report, analysed what 600 kids aged between 10 and 15 and located around the world were up to Facebook. The end result reveals those common behaviours that increase the exposure of children to bullying online, predatory threat and …

Member Avatar for LastMitch
3
436
Member Avatar for happygeek

It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of …

Member Avatar for KRRahman
1
468
Member Avatar for happygeek

The media, online and off, has been full of scare stories about the 'biggest Internet attack ever' and how a distributed denial of service (DDoS) campaign aimed against anti-spam outfit Spamhaus peaked at an attack volume of 300 Gbps (the highest ever recorded by those who record such things) was …

Member Avatar for rajutech
4
575
Member Avatar for happygeek

With a billion members, active social circles and more than it's fair share of relative newbies to the world of online security, it should come as no surprise that Facebook continues to be the focus of much attention from those who would do you, your data and your bank balance …

Member Avatar for LastMitch
0
333
Member Avatar for happygeek

Microsoft first started warning people that the there was going to be an important change to Windows' certificate requirements back in June. A change that is designed to improve security across the Windows platform by way of increasing the RSA key length to a minimum of 1024 bits for certificates …

Member Avatar for LastMitch
0
370
Member Avatar for happygeek

Security researchers reveal ways that willy-waving Chatroulette users might be leaving themselves open to much more than accusations of just being dirty perverts as privacy attack scenarios are explored. [attach]15830[/attach]If you have ever been tempted, like so many male Chatroulette users, to show complete strangers the contents of your trousers …

Member Avatar for chatroulette1
0
1K
Member Avatar for happygeek

Zurich Insurance in the UK has just discovered the true cost of failing to secure confidential customer data properly, as the Financial Services Authority (FSA) fines the company a record £2.275m ($3.5m) for the data loss incident in 2008 which potentially put some 46,000 customers at risk. [attach]16866[/attach]The incident occurred …

Member Avatar for LastMitch
1
566
Member Avatar for happygeek

Just as your average Joe starts to 'get' the importance of online security, and that means using anti-virus software, so the bad guys start exploiting this new found understanding by flooding the Internet with fake AV products. [attach]16913[/attach]Security researchers at [URL="http://www.sophos.com"]SophosLabs have today identified a major new fake anti-virus software …

Member Avatar for LastMitch
1
1K
Member Avatar for happygeek

[ATTACH=RIGHT]22213[/ATTACH]You may not be a big fan of Microsoft, but you wouldn't expect your computer to be held to ransom by the company would you? In recent months it has become quite commonplace, at least across Europe, for scammers posing as Microsoft technical support staff to 'cold call' people on …

Member Avatar for caperjack
0
419
Member Avatar for happygeek

The line ‘free crypto browser extension for Firefox’ contains six of my favorite words within its seven-word construction, which is not bad going. In case you were wondering, for is the word that doesn’t float my boat, although others such as complexity, ‘key management’ and PGP which usually rub me …

Member Avatar for LastMitch
0
409
Member Avatar for happygeek

This is, I would suggest, perhaps the biggest privacy issue of the day. I have lost count of the number of press releases, leads, emails and telephone calls that have come my way this year regarding how search engines treat the data you enter when performing a search. Be it …

Member Avatar for LastMitch
0
567
Member Avatar for happygeek

Apple hacking PWN2OWN supremo and security researcher Charlie Miller is preparing to reveal just how to hack an Apple MacBook battery. Yep, you read that right: Apple battery hacking could be coming to a MacBook near you soon. Well, near you if you happen to be in Las Vegas for …

Member Avatar for LastMitch
1
363
Member Avatar for happygeek

With no actual Halloween-based security threats to report, it looks like the security vendors have had no choice but to start reporting scary stuff that might happen to your data instead. While I have no qualms about genuine warnings to 'be careful out there' this Halloween, a little reminder about …

Member Avatar for LastMitch
1
514

The End.