4,338 Archived Topics
Remove Filter ![]() | |
[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It … | |
If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question … Networking data-protection data-science encryption http-protocol session storage | |
It has been a couple of months now since a Russian security researcher, Evgeny Legerov, confirmed that the widely deployed media software RealPlayer was vulnerable to a zero-day exploit. The Russian company, Gleg, is in the business of selling information on such exploits and security flaws. Unfortunately, according RealNetworks's Vice … Networking cybersecurity multimedia | |
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … | |
It has been a long time coming, but a virus writer has finally been arrested by the Japanese authorities. According to security specialists [URL="http://www.sophos.com"]Sophos[/URL] law enforcement agencies in Kyoto, Japan, have arrested three men who stand accused of plotting to infect users of a popular P2P file-sharing network with a … Networking cybersecurity virus-malware | |
A CIA analyst speaking at the SANS 2008 SCADA and Process Control Summit in New Orleans has admitted that hackers have not only been able to penetrate the power grids of several countries, but also successfully cut power to several cities, all from the relative safety of the Internet. Central … Networking cybersecurity motherboards-cpu-ram | |
Kaspersky Lab has [URL="http://www.viruslist.com/en/analysis?pubid=204791980"]published its list[/URL] of the most prevalent viruses for the end of 2007, and although an email worm retains the top spot the more interesting stuff is happening immediately below it in the rankings of shame. Specifically, the second, fourth and seventh places which are all occupied … Networking cybersecurity virus-malware | |
Nick Breese is a researcher with New Zealand based security outfit [URL="http://security-assessment.com/"]Security-Assessment.com[/URL] and found himself giving a presentation at the Kiwicon hacker conference in Wellington earlier this week. His presentation looked at the use of the PlayStation 3 games console to crack passwords, and Breese concluded that when compared to … Networking cybersecurity encryption gaming pdf | |
Research commissioned by Internet security software makers [URL="http://www.avguk.com/stop-cybertheft"]AVG[/URL] has revealed that one in three people in the UK have experienced some kind of cyber theft over the Internet. What's more, it is also one of the UK's most feared crimes, outranking burglary, assault and robbery according to the independent study … Networking cybersecurity | |
[URL="http://www.mcafee.com"]McAfee Inc[/URL]. has today released the results of new research which found that nearly one in four people in Europe are putting themselves at increased risk of online fraud or identity theft simply because of poor password habits. The research, of 3500 consumers in the UK, France, Germany, Italy, Spain … Networking cybersecurity | |
In the UK last year there were a staggering 3,237,500 cybercrimes committed according to a new [URL="https://www.garlik.com/index1.php?page=cybercrime"]report[/URL] from online identity specialists [URL="http://www.garlik.com"]Garlik[/URL] in collaboration with leading criminologists. Do the math and that works out to one cybercrime committed every ten seconds in the UK alone. Of these, some 60 percent … Networking cybersecurity | |
According to a report in the [URL="http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html"]Financial Times[/URL] of all publications, the Chinese military has hacked the Pentagon in what it describes as the most successful cyber attack on the US defense department to date. Although the Pentagon has acknowledged that a computer system which serves the office of US … Networking cms cybersecurity | |
A Symantec Security Response [URL="http://www.symantec.com/enterprise/security_response/weblog/2007/08/a_monster_trojan.html"]posting[/URL] suggests that Monster.com, the huge job hunting website, has been subject to an online attack resulting in the theft of personal data in the form of resumes of its users. "We analyzed a sample of a new Trojan, called Infostealer.Monstres, which was attempting to access … Networking cybersecurity web-server | |
Jeff Jones is a Strategy Director in the Microsoft Security Technology Unit, part of the team trying to make Microsoft products more secure, poor guy. No surprise that he publishes a vulnerability report on his Microsoft TechNet hosted [URL="http://blogs.technet.com/security/default.aspx"]Security Blog[/URL] which always seems to suggest that Microsoft Windows is far … Networking client-server cybersecurity microsoft redhat ubuntu | |
Twenty years ago the hard drives I recall using might not have been fast in the data transfer stakes, they were certainly not lithe and sexy pieces of hardware and I prefer not to think how much I actually paid for a large and clunky bit of kit to store … Networking hard-drive storage ![]() | |
[CODE]Using 'common sense' to clear the Microsoft fog of illusion.[/CODE] [[ ...Continued from previous post [url]http://www.daniweb.com/blogs/entry1527.html[/url] ]] 4. Unable to comprehend security issues. Even when the United States government warns people to avoid using specific software for personal security reasons, the Microsoft sheep act like they don't understand the reasons. … | |
According to a posting by someone calling themselves Gabriel, published on the Full Disclosure list (warning – [URL="http://seclists.org/fulldisclosure/2007/Jun/0380.html"]this link[/URL] contains the so-called plot spoiler), the ending of the yet to be published Harry Potter and the Deathly Hallows book has been revealed. Not by magic or wizardry, but by good … Networking cybersecurity java-swing legal publishing | |
As reported [URL="http://www.daniweb.com/blogs/entry1490.html"]here[/URL] last week, three security flaws had been discovered that impacted upon the 2.6.x Kernel. A NULL-pointer dereference within netfilter when handling SCTP connections with unknown chunk types that could be exploited to crash the kernel; a cpuset_task_read() function in /kernel/cpuset.c which had an underflow error that could … Networking cybersecurity linux-kernel | |
According to postings at [URL="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"]Kernel.org[/URL] concerning a report by Vilmos Nebehaj which was consequently signed off by Linus Torvalds and Chris Wright, the Linux Kernel 2.6.x has multiple security vulnerabilities. Well, to be precise, two vulnerabilities and what is described as a ‘weakness’ which are capable of being exploited by … Networking cybersecurity linux-kernel | |
Independent Austrian antivirus testing outfit [URL="http://www.av-comparatives.org/"]AV Comparatives[/URL] has a reputation for going the extra mile when putting products through their paces. Something that Microsoft discovered to its cost earlier in the year when, rather embarrassingly, its flagship OneCare antivirus product managed to finish last and fail to get a highly … Networking cybersecurity virus-malware | |
[URL="http://www.gentoo.org"]Gentoo[/URL] has issued a security advisory with a high impact rating affecting users of PHP <5.2.2. Several vulnerabilities have been found in PHP, not least a huge number discovered by Stefan Esser during the infamous Month Of PHP Bugs (MOPB) including integer overflows in wbmp.c from the GD library and … Networking cybersecurity php | |
IT security professional Didier Stevens has been conducting an experiment into computer user stupidity by running a Google Adwords campaign which offers to infect your PC for free. The advert actually read: [B]Drive-By Download Is your PC virus-free? Get it infected here![/B] Which should be enough to stop all but … Networking cybersecurity pay-per-click virus-malware | |
For the average user spam has always been an annoyance. For the average spammer it has always been about making money. For the criminal gangs that have muscled in on this lucrative industry during the last few years it is now about territory and control. Control, that is, of the … Networking abuse cybersecurity virus-malware | |
GPS satellite navigation devices have become an indispensable part of everyday life for millions of drivers the world over. Without these little technological route planning miracles, many of us would literally crash and burn as we struggled to regain control over that map while driving too fast and drinking a … Networking cybersecurity encryption engineering | |
If you're visiting a known site such as Google.com, you're perfectly safe, right? Wrong. New DNS vulnerabilities in Microsoft's Windows 2000 and 2003 severs could potentially allow a DNS server to get hijacked, and redirect a user to a completely different site than they expected to see. The vulnerability exists … Networking abuse cybersecurity dns | |
The [URL="http://www.itu.int"]International Telecommunication Union[/URL] (ITU)[URL="http://www.itu.int/"][/URL] and the [URL="http://www.aptsec.org"]Asia Pacific Telecommunity[/URL] (APT)[URL="http://www.aptsec.org/"][/URL] today announced the outcome of a jointly organized workshop in Bangkok, Thailand which addressed plans for the implementation and development of Next-Generation Networks (NGN) in the region. With over 180 experts from 24 countries attending, including representatives of international … Networking multimedia operating-system | |
I have been a supporter of RAID for the longest time; after all it would be crazy not to like something that brings efficiency and protection to the data storage process. RAID has certainly provided both, but that was then and this is now, and it is time for RAID … Networking data-protection data-science hard-drive mac-software robotics storage | |
IT security specialist [URL="http://www.sophos.com"]Sophos[/URL] is warning anyone with a website about recently uncovered evidence that spammers are hacking into legitimate sites in order to sell drugs. Online pharmacy spam, be it under the Viagra or just general prescription drug banner, has become one of the most annoying and persistent forms … Networking abuse cybersecurity php | |
I invented an encryption algorhythm today and used it to "hide" the information in an unused password I came up with. This was done on paper, not with a program. However, I am planning to start laying some code down for this today (in Haskell, partly as an exercise to … Networking encryption perl regex | |
Just recently, the development group that I work with decided to adopt Linux as our standard operating system for the server-side of our project. Linux is a great choice of server OS for many obvious, and not-so-obvious, reasons. It's extremely flexible, stable, and secure, and works on just about any … Networking apple apple-hardware hard-drive operating-system redhat web-server | |
J.K.Rowling has now officially announced that the latest, and last, in the Harry Potter series of books will be called ‘Harry Potter and the Deathly Hallows’ putting an end to the frenzy of speculation on the subject over the last few months. While it has been genuine fans interested in … Networking business-entrepreneurship legal | |
According to my Finnish friends, [URL="http://www.f-secure.com"]F-Secure[/URL], Bagle looks like it might be back in business. Not that it has ever really gone away of course, as it is one of the most prevalent of worm families. F-Secure have noticed new activity during the last couple of days, which sees a … Networking cybersecurity virus-malware | |
London taxi drivers have a reputation as being amongst the most opinionated and talkative in the world, and their grueling training and testing program ‘The Knowledge’ is equally well known. Now, it appears, the black cab driver has a new claim to fame: the place where more technology kit is … Networking cybersecurity | |
[URL="http://www.kaspersky.com/"]Kaspersky Lab[/URL] has released its latest Malware Evolution [URL="http://www.viruslist.com/en/analysis?pubid=204791907"]report[/URL], covering the period between June and September 2006 and, as usual, it makes for interesting reading. Alexander Gostev, Senior Virus Analyst, Kaspersky Lab comments that the first six months of 2006 was “notable for the complexity of the technologies which antivirus … Networking cybersecurity microsoft virus-malware | |
I hate it, you hate it, [B]everyone hates spam[/B]. Perhaps just as annoying as the fact that most of us have no interest in improving our sexual performance, enlarging our sexual organs or accepting a refinancing deal from a complete stranger, is the fact that we just do not know … Networking abuse cybersecurity email | |
Microsoft has issued an [URL="http://www.microsoft.com/technet/security/advisory/927709.mspx"]advisory [/URL]warning about a Visual Studio 2005 vulnerability in the WMI Object Broker ActiveX control, part of WmiScriptUtils.dll which could allow remote arbitrary code execution. The WMI Object Broker ActiveX control will circumvent the ActiveX security model, because it is marked as being ‘safe for scripting’ … Networking cybersecurity microsoft visual-studio | |
According to Symantec, 64% of small businesses have seen a surge in the volume of spam received during the previous six months. And it isn’t the only one: whether you talk to ISPs or security vendors, gateway mail filtering services or end users, the message is the same. Spam is … Networking abuse cybersecurity virus-malware | |
The [URL="http://www.acte.org"]Association of Corporate Travel Executives[/URL] (ACTE) has warned, during a conference in Barcelona this week, that the visitors to the United States risk having their laptops seized and searched on arrival and departure. The law applies equally to US and non-US passport holders, and following an appeal judgment in … Networking cybersecurity legal | |
According to a survey by the [URL="http://www.ponemon.org"]Ponemon Institute[/URL], sponsored by [URL="http://www.pgp.com"]PGP Corporation[/URL] and [URL="http://www.vontu.com"]Vontu Inc[/URL], the true cost of data breaches in 2006 was $182 per compromised record on average, that is a 31% increase over the 2005 figures. Furthermore, the results of the report, published today, reveal that the … Networking cybersecurity legal | |
You cannot fault the Japanese arm of Mc Donald’s for moving with the times and giving away Flash MP3 players as prizes in a competition to customers who bought large Coca-Cola drinks. But, to be honest, I would rather have had the usual tacky plastic movie tie-in toy because at … Networking cybersecurity data-protection flash virus-malware | |
Hey, In my college, the internet is accessible after you connect to the college's (open/public) wireless network and login using a web page that opens up when you try to open sites without logging in. I am trying to set that feature for my home network, but have not been … Networking lan-wan | |
I apologize if I'm posting in the wrong spot, this is a first time for me. My wireless computer is connected to the internet but I can't update the virus definitions in my anti-virus program. I've tried downloading a different anti-virus program but I can't get to the websites. The … Networking | |
Hello, i have a strange problem.. I have a branch office and its connected to main office thru Cisco vpn. it has its own subnet. now on one of the comps I cannot make oultook run localy nor I can map drive. when I try mapping with IP it works … Networking dns | |
Hi all, I want to discuss my recently encountered problem. I'm a newbie in this forum and IT-related issue so please explain the solution as simple as possible if u can. My laptop and connection condition : I have an ACER-aspire 5572NWxMi laptop I am living in a dormitory and … Networking dns | |
Hi all - This is going to seem like an odd post since it's not too technical in nature, but I'm hoping you can help set my mind at ease or confirm my high level of anxiety. I was on my home computer using Yahoo Messenger and chatting with a … Networking | |
I just got a linksys WRT54GC. I followed the step by step instruction and at step 6 where the internet connection is tested, it always says no internet connection was found, check cables. I checked the cables and they are fine. I tried going to the routers IP address and … Networking dns | |
Hi to all. I want to setup my personal computer a personal firewall... what do you think firewall can I use? thanks. Networking | |
Ok I went to RadioShack today, looking for an internal wireless card, but they did not have any internal wireless cards, so I ended up getting a Netgear Wireless-G USB 2.0 Adapter. It is 54 Mbps, 2.4 GHz, and 802.11g. But it seems kind of slow and it shows my … Networking | |
If i use the pc without lan, it works fine no problem at all. But the moment i connect the pc on LAN, it shuts down. Using cross cable i can connect it to another desktop. But not possible to connect to LAN using straight cable. Tried changing port and … Networking |
The End.