1,120 Topics

Member Avatar for
Member Avatar for happygeek

It's not the first time that Johnny Depp has died according to the Internet, but this time he is not alone. According to an ongoing online campaign, celebrities including Beyonce, Bon Jovi, Brad Pitt, Cameron Diaz and David Beckham have all been killed in tragic circumstances. Perhaps surprisingly [URL="http://www.daniweb.com/news/thread306364.html"]Lady Gaga …

0
422
Member Avatar for Glass_Joe

[ATTACH=RIGHT]16788[/ATTACH]If you’re a petty thief, an iPhone must look like a mobile Mona Lisa. Their sleek design, variety of features, portability, coveted ownership, and lofty price make for an appealing and readily available target. But scum of the earth pay heed: Apple filed for a patent yesterday (August 19th) to …

Member Avatar for Agni
0
1K
Member Avatar for Glass_Joe

[ATTACH=RIGHT]16752[/ATTACH]Intel announced on Thursday their agreement to purchase all of McAfee’s common stocks at $48 a share, a deal approximately worth $7.68 billion. McAfee will act as a wholly-owned subsidiary and report to Intel’s Software and Services Group. The endeavor marks what is sure to be a harmonious relationship for …

Member Avatar for marshal_ramdev
1
456
Member Avatar for slfisher

Not only is there a [URL="http://www.daniweb.com/news/story304425.html"]debate [/URL]about the constitutionality of using Global Positioning System units to help fight crime – now there’s concern about using Google Earth as well. The Associated Press [URL="http://news.yahoo.com/s/ap/20100814/ap_on_hi_te/us_eyes_in_the_sky"]reported [/URL]a few days ago that government officials in regions ranging from the Riverhead, N.Y., to the country …

Member Avatar for msfreeh
0
275
Member Avatar for slfisher

Geolocation features in cameras are giving thieves new information when someone proudly posts a picture of their new acquisition, whether it's a boat, a flat-screen TV, or a new car, according to an [URL="http://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html?_r=1"]article [/URL]last week in the [I]New York Times[/I]. Some cameras and smart phones embed location-specific information, such …

Member Avatar for slfisher
1
462
Member Avatar for EricMack

[ATTACH=right]16534[/ATTACH]Alcohol remains off limits, but it looks like Saudis will still be allowed to feed their Crackberry addiction after all. The Saudi government had said that it would begin blocking Blackberry's instant messaging services on Friday - claiming that by not being allowed to monitor messages, the popular devices and …

0
525
Member Avatar for newsguy

Mac OS X is not, on the whole, known as an OS which attracts too many problems when it comes to malware. However, in the last few days there has been something of a scare involving the Immunizator Trojan. [URL="http://www.sophos.com/news/2008/03/imunizator.html"]According to IT security specialists Sophos[/URL] this may well just be …

Member Avatar for GoodLuckChuck
0
235
Member Avatar for DragerAZ

I have become infected with the Security Tool virus/trojan/malware. In normal startup mode for Windows XP SP2. I am not able to run any .exe programs without getting a message from Security Tool that the program is infected with (insert virus/trojan/malware here) and is attempting to send my credit card …

Member Avatar for DragerAZ
0
1K
Member Avatar for CatRambo

[ATTACH=RIGHT]16335[/ATTACH]On August 1, [URL="http://www.tombom.co.uk/blog/?p=262"]Defcon attendee Chris Paget showcased the vulnerability of the AT&T network[/URL] by eavesdropping on cell phone calls in front of a live audience. Paget warned attendees ahead of time what he planned to do: [I]1. If you’re in an area where your cellphone calls might be intercepted, …

0
366
Member Avatar for CatRambo

Security company [URL="http://www.barracudalabs.com/"]Barracuda Networks[/URL] has named Google the "king of malware," in [URL="http://www.barracudalabs.com/downloads/BarracudaLabs2010MidyearSecurityReport.pdf"]a report released this month[/URL] that shows the popular search site linking to twice as many malware sites and files as its chief competitors, Bing, Twitter, and Yahoo combined. [ATTACH]16328[/ATTACH]Barracuda points to a growing need for online reputation …

0
495
Member Avatar for EricMack

[ATTACH=right]16305[/ATTACH]No more shortcuts for hackers - that's the word from Microsoft, which plans to release a patch today that the company says will fix a security loophole. The issue is tied to the way the Windows OS handles shortcuts, or .lnk files, or as Microsoft explains it in the [URL="http://www.microsoft.com/technet/security/advisory/2286198.mspx"]official …

1
337
Member Avatar for happygeek

[attach=right]14422[/attach]File under oops. The website of The Telegraph newspaper has been defaced by hackers, apparently upset at a cult British television show and the newspaper itself for mocking their country. The 'Romania National Security' hacking group has claimed responsibility for the attack which hit a couple of third party services …

Member Avatar for hugoboss1
1
269
Member Avatar for CatRambo

[ATTACH=right]16252[/ATTACH][URL="http://mobile.venturebeat.com/2010/07/28/android-wallpaper-app-that-steals-your-data-was-downloaded-by-millions/"]Questions have been raised[/URL] about an Android wallpaper application that is collecting personal data and sending it to a site, [url]www.imnet.com[/url], in Shenzen, China. It's unclear why the data is being collected or what use might be made of it. The app Wallpaper, which originated from developer Jackeey, was uploaded …

Member Avatar for mantis.wang
0
226
Member Avatar for happygeek

Netbooks remain hugely popular courtesy of their small form factor and low price, both achieved partly due to the relatively limited technical specs of the average device. Low computing power and Internet security suite software do not, it has to be said, traditionally make for good bed-fellows. Which leaves netbook …

0
298
Member Avatar for Niki_Fears

At the [URL="http://www.blackhat.com/"]Black Hat[/URL] conference in Las Vegas, Barnaby Jack gave a demonstration of how he learned to crack the security of various stand alone ATM's. While they have long been at risk for physical theft (someone stealing or physically breaking into the internal safe of the ATM itself), this …

0
1K
Member Avatar for CatRambo

[ATTACH=right]16134[/ATTACH]At [URL="http://googleblog.blogspot.com/2010/07/introducing-google-apps-for-government.html"]today's press conference[/URL], Google announced a new version of its Google Apps productivity suite, [URL="http://www.google.com/apps/intl/en/government/trust.html"]Google Apps For Government[/URL]. The software has been certified as meeting U.S. Government security requirements. Like the Premier version of their suite, the cost is a yearly charge of $50 per user, and includes applications …

0
545
Member Avatar for happygeek

The 48,727 [URL="http://twitter.com/nasa_astronauts"]followers of the NASA Astronaut account on Twitter[/URL] expect to hear about updates on astronaut activity and get some personal insight from the astronauts themselves. They probably were not expecting to be bombarded by spacemen offering to sell them plasma and LCD flat-screen TVs at bargain prices however. …

Member Avatar for happygeek
0
678
Member Avatar for matwe

hi.. can anybody help me to list a few java security problems and its solution? i hope somebody will help me.. thanksss..

Member Avatar for tong1
0
85
Member Avatar for Joel Ferman

[ATTACH=right]16006[/ATTACH][I]Part dedicated professional, part creative thinker and part con man.[/I] On a weekly basis a major corporation’s data is compromised in a most public fashion – in an instant slaughtering consumer confidence and bringing immediate disgrace. Who doesn’t remember the Google Aurora attacks and AT&T’s iPad data leak exposing 114,000 …

Member Avatar for Ndoom
0
303
Member Avatar for Niki_Fears

Security researchers have been looking at Safari, the standard browser for Apple's Mac computers, and have found a troublesome security problem. It seems that there is a feature that could reveal your personal information. The problem is with the Auto Fill feature which is designed as a part of the …

0
762
Member Avatar for Rickay

why doesn't this work? [CODE]int main() { fstream file; char output[100], pasword[100]; int a; const string x("Yes"); const string y("No"); string z; char b; cout << "\nEnter correct password to continue: \n" << endl; cin.getline(output, 15); if(output == "file.txt") { cout << "Change password? Type Yes or No. \n" << …

Member Avatar for Ancient Dragon
0
141
Member Avatar for happygeek

The good news is that security savvy Windows users will, more than likely, have already disabled the AutoRun and AutoPlay features. The bad news is that a new zero-day vulnerability could care less, and executes automatically anyway. [attach]15918[/attach]The zero-day vulnerability in question was first spotted by Sergey Ulase, a researcher …

0
243
Member Avatar for happygeek

Most people seem to think that Microsoft is the most insecure vendor while Apple reigns supreme at the top of the good security league. However, a new security report would appear to turn that assumption on its head, claiming that when it comes to the vendor with the most vulnerabilities …

Member Avatar for aaln
0
576
Member Avatar for happygeek

Viral videos are usually a great laugh, which is why they spread so quickly and the reason they get called viral in the first place. But the laughter soon stops when the bad guys use the lure of a viral video to launch a clickjacking attack. [attach]15852[/attach]Security researchers at Sophos …

3
205
Member Avatar for roezer

I am not a developer I am a user of the Internet and very active so active that I need to use a password manager now the problem with this is that I use the password manager to save me time and one of the biggest problems is that some …

Member Avatar for roezer
0
129
Member Avatar for happygeek

Hackers have targeted Justin Bieber videos on YouTube, exploiting a cross-site scripting vulnerability which enabled them to bombard viewers with pop-up messages and redirect them to porn sites. The hack attack lasted for the best part of two hours before Google was able to isolate the problem and apply a …

Member Avatar for dnanetwork
1
828
Member Avatar for happygeek

For the longest time there has been an implied, some might even say explicit, connection between computer infection and online pornography. According to one developer of AntiVirus software that connection has now been well and truly broken. Ondrej Vlcek, the CTO at [URL="http://www.avast.com"]AVAST Software[/URL], has announced the results of research …

Member Avatar for Dcurvez
1
550
Member Avatar for happygeek

Stand up if you like paying your income tax. To all of you who have remained seated, which I will assume is indeed all of you, I have some more bad news: the bogus tax collectors want your money as well, and now they have botnets helping them. [attach]15770[/attach]According to …

0
572
Member Avatar for happygeek

New [URL="http://www.getsafeonline.org"]research carried out on behalf of Get Safe Online[/URL], a national Internet security awareness initiative backed by the UK Government and the Serious Organised Crime Agency, has revealed that 30 percent of Internet users are putting themselves at risk when they book a holiday online. [attach]15742[/attach]Get Safe Online and …

0
1K
Member Avatar for Romson

Hi All, I need some help with one of my sites: SNIP Can you find any foul code/script that could be inserted. I recently opened my site and a competitors site just popped-up. I did several scans but couldn't find anything. Also websecurity isn't really my field of work. Any …

0
131

The End.