1,118 Topics

Member Avatar for
Member Avatar for kevin best

Hello all, I 'm new to network security and have few question to be clarified. I will appreciate if experts give me a proper defination. 1)Security incident has happened , a hacker 's hacked into a monitored network what should be done? 2)Definition of port scanning 3)Who's responsible for overall …

Member Avatar for Acrimonus
0
108
Member Avatar for newsguy

As Safer Internet Day comes to a close, one expert in the field warns that there can be no safety without security. John Colley is managing director of [URL="http://www.isc2.org/"](ISC)2[/URL], a non profit organisation which runs a program helping volunteers visit schools, clubs and parent evenings. They also support council appointed …

0
1K
Member Avatar for happygeek

Websense Security Labs has [URL="http://community.websense.com/blogs/websense-features/archive/2010/02/01/websense-security-labs-report-state-of-internet-security-q3-q4-2009.aspx"]published[/URL] its bi-annual State of Internet Security report and, as usual, it makes for pretty interesting if somewhat scary reading. Covering the last six months of 2009, the report is based upon the findings of the ThreatSeeker Network which is used to discover, classify and monitor …

Member Avatar for janklaza
1
2K
Member Avatar for newsguy

According to a recent Kaspersky security research report, stolen [URL="http://www.daniweb.com/news/story237081.html"]Twitter accounts[/URL] are being sold on the black market for as much as $1000 a time. This really should not come as any great surprise given that the rapid [URL="http://www.daniweb.com/news/story231627.html"]evolution of social media[/URL] mirrors the rapid [URL="http://www.daniweb.com/news/story238033.html"]evolution of cybercrime[/URL]. The price …

Member Avatar for InsightsDigital
1
383
Member Avatar for happygeek

Three men have been arrested, and what is thought to be a training site for hackers closed down, as Chinese officials get tough in the wake of the [URL="http://www.daniweb.com/news/story252590.html"]Google Gmail human rights hacking scandal[/URL]. While China has something of a history of being [URL="http://www.daniweb.com/blogs/entry4434.html"]tough on political activists[/URL], online [URL="http://www.daniweb.com/news/story235672.html"]multi-player gaming[/URL] …

0
439
Member Avatar for happygeek

It all kicked off last night with a [URL="http://hackersblog.org/2009/02/07/usakasperskycom-hacked-full-database-acces-sql-injection/"]posting to hacker board[/URL] claiming to have carried out a relatively simple SQL Injection attack on one the world's biggest and best known IT security companies: Kaspersky. The hacker, currently only know as 'unu' claims that the SQL Injection attack on usa.kaspersky.com …

Member Avatar for rayeesmkrayees
0
450
Member Avatar for happygeek

Apple has this week released a software update for the iPhone which addresses a total of five security vulnerabilities. But not, it would seem, the small matter of a year old glitch which could turn your iPhone into a spyPhone. First the good news, Apple has released [URL="http://support.apple.com/kb/HT4013"]iPhone OS 3.1.3[/URL] …

0
524
Member Avatar for happygeek

In an [URL="http://www.guardian.co.uk/technology/2010/jan/24/computer-security-crime-anonymous-datasets"]interview[/URL] with The Observer newspaper, Dr Ian Brown from the Oxford Internet Institute who is writing a report on anonymous datasets for the European Commission warns that "criminals could identify individuals through mobile phone data and use the information to track people's movements and find out when they …

Member Avatar for DeAnonym
2
305
Member Avatar for happygeek

It doesn't take a search genius to go and find [URL="http://www.daniweb.com/news/story253418.html"]plenty of reports[/URL] of how Internet Explorer is, how can I put this nicely, [URL="http://www.itpro.co.uk/blogs/daveyw/2009/11/22/ie-6-and-7-hit-by-hack-attack-code/"]not exactly the safest bet[/URL] if you are looking for the most secure browsing experience. Quite apart from anything else it has the biggest market share …

1
270
Member Avatar for khess

I love mythology and there's nothing like hearing a technology myth to make my day complete. Just today someone applied one of the following myths in a conversation with me. I didn't say anything but it gave me the idea for this post. Here are the five myths related to …

Member Avatar for ripratm
0
2K
Member Avatar for newsguy

I have a lot of passwords to get me onto various online sites and services, but I only need to remember one: the complex and hard to crack one that unlocks my encrypted password store. Not everyone is as paranoid as I am it seems, and many fall neatly into …

Member Avatar for Salem
1
416
Member Avatar for happygeek

Yesterday [URL="http://www.daniweb.com/blogs/entry3943.html"]I reported[/URL] how the security vendor Kaspersky had allegedly fallen victim to a SQL Injection attack, with the usa.kaspersky.com website hacked and plenty of data potentially exposed. I said that Kaspersky would no doubt make an official statement sooner rather than later, and it has. Unfortunately it is one …

Member Avatar for wildsniper
0
590
Member Avatar for happygeek

No sooner had the news of the untimely [URL="http://www.itpro.co.uk/blogs/daveyw/2009/06/28/that-michael-jackson-effect/"]death of Michael Jackson[/URL] hit the Internet than the vultures started circling. For once it was not the gossip columnists and tabloid journalists digging up the dirt, but rather spammers and hackers looking to exploit a golden opportunity to distribute their wares …

Member Avatar for happygeek
0
239
Member Avatar for happygeek

I would like to think that anyone watching, reading or listening to news reports of the unfolding tragedy that is post-earthquake Haiti could not fail to be moved first to tears and then prompted to want to do something. Most people have responded by asking themselves 'what can I do …

Member Avatar for canadafred
2
479
Member Avatar for happygeek

Internet security giant Symantec has just published the latest [URL="http://www.symantec.com/enterprise/theme.jsp?themeid=threatreport"]Internet Security Threat Report[/URL], based on an in-depth analysis of global Internet traffic and email during the last six months. Beyond all the usual who is hosting what and where, how much malware is contained in spam and which threats are …

Member Avatar for paulanderson154
1
676
Member Avatar for happygeek

Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. …

Member Avatar for HenryTom
3
612
Member Avatar for happygeek

Google has signalled, in the strongest possible manner, that it will be pulling out of China unless something is done to address censorship of searches. It has also accused China of launching a "highly sophisticated and targeted attack" on the Google corporate infrastructure, along with another twenty large companies from …

Member Avatar for canadafred
2
710
Member Avatar for sayeedbd

Hello All, I am trying to lock some my video, picture, Excel and Word file in my PC by using Visual Basic. I am using Visual Studio 2008 to develop this application but I am unable to do this job. It'll be something like security utility application. Actually without me, …

Member Avatar for sayeedbd
0
189
Member Avatar for Voulnet

Hello there fellow users, I have been entrusted with the task of designing and implementing a financial system for a charity foundation where I live. The charity foundation requires its work (addition and retrieval of records, for example) to be done online, using a web app. The app connects to …

Member Avatar for nav33n
0
104
Member Avatar for stranoblaze

i keep getting these pop up notifications with the red badge and white X on the bottom right of my computer. it won't allow me to open up any websites in Explorer. it also won't allow me to run any of my anti-virus and ad-aware software as if it's blocking …

Member Avatar for stranoblaze
0
294
Member Avatar for khess

The Obama Administration vows to cut costs in part by using open source software (Software whose source code is made available to the user), cloud computing, virtualization, Linux and other low cost technologies. But, does the use of open source software put the government, its records and our national security …

Member Avatar for pogson
2
854
Member Avatar for heso10

Hi, i am doing a project about key management and i need a good book that discusses key management in details, thanks for your help.

Member Avatar for brayan
1
148
Member Avatar for happygeek

File under FAIL: social network widget maker RockYou has fallen victim to a SQL injection flaw and as a result some 32.6 million users are being urged to change their passwords as a matter of urgency. Security specialists Imperva discovered the problem at social networking development site Rockyou.com and issued …

Member Avatar for Alex_
1
825
Member Avatar for newsguy

Thought that 2009 was [URL="http://www.daniweb.com/news/post975935.html"]the year that botnets died[/URL], well think again Batman, it was actually the year they bounced back. Compromised computers were responsible for distributing 83.4% of the 107 billion spam messages sent around the world, every single day, during 2009 according to a new Symantec report. Indeed, …

Member Avatar for AnonymousHoward
3
1K
Member Avatar for happygeek

Still using Adobe Acrobat or Adobe Reader? Maybe it is time to switch to something that's not glowing red on the bad guy radar, or which is more securely coded depending upon how you look at these things. Yes, Adobe has admitted that there is yet another possible zero-day vulnerability …

0
374
Member Avatar for Clawsy

Hello, I built a chat application that uses sockets and TCP/IP protocol. The client is an applet. The problem is I cannot connect the applet client with the desktop server application. [I]If I run the applet inside the applet viewer in NetBeans it works perfectly[/I]. I even tried the applet …

Member Avatar for Phaelax
0
152
Member Avatar for kotten2

With the reality of software security vulnerabilities coming into sharp focus over the past few years, businesses are wrestling with the additional risk that poor security introduces. And while the risk is becoming clearer, methods to defend applications from attack remain murky. Further clouding the picture, the responsibility for application …

0
330
Member Avatar for GuyClapperton

Smaller businesses and people who use Hotmail as n email system or backup email system need to change their passwords - Microsoft has confirmed it's investigating a security breach. It seems that in spite of the industrial strength security everybody of any size applies to these systems - and let's …

Member Avatar for billflisk
0
231
Member Avatar for jessec

Hi, I'm not sure if this is the right place for it. I'm thinking of creating a secure place on the internet. Some of my presumptions are: 1 - That no system/network is to be trusted. 2 - Important data should be encrypted. 3 - The link between data and …

Member Avatar for jessec
0
111
Member Avatar for Voulnet

Hello all, I am a Computer Engineer, fresh off graduation, and I would like to educate myself on a broad range of technological fields and aspects. I am the kind of person who is easily distracted while reading from a screen, and so I would like to ask fellow daniweb …

Member Avatar for Voulnet
2
195

The End.