5,261 Posted Topics
A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side … ![]() | |
Re: The Galaxy Ace is a good mid-range option, not too expensive. | |
Well, have to say that was a much better performance from Wales to not only break the long run of losing internationals but to do so in Paris. The French looked like a shadow of their former selves, never really getting into the game at all. Now, fingers crossed that … ![]() | |
Think of spam and chances are your mind immediately turns to China or Russia and messages about sexual dysfunction or a financial deal you cannot believe. Maybe, though, your thoughts should be closer to home. Especially if home is in the United States. [ATTACH=RIGHT]22797[/ATTACH]According to the latest research from security … ![]() | |
At the risk of being somewhat obsessed by hitmen after [one recent news story](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/441025/dont-be-fooled-by-the-fake-hitman-scam) here at DaniWeb, I'm running another. This time though, it's cybercriminals and hackers who would hold your computer and data to ransom that are the target of a contract killer. The killer in question being the … ![]() | |
Re: You are right, it's not a forum it is a community of like-minded people and that's what sets us apart, I like to think, from the others out there. | |
It's never easy calculating the true cost of inadequate security to business, not least as there are so many variables and such reticence when it comes to full disclosure for fear of brand damage. However, the latest [Information Security Breaches Survey](http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml) (ISBS) from PwC/Infosecurity Europe has had a good bash … ![]() | |
You might not have heard about Dirt Jumper yet, but the bad guys have. In fact, the high-risk and highly-effective DDoS toolkit is probably the most aggressive of the malware tools being employed by DDoS attackers at the moment, and the situation is set to get much worse very quickly … ![]() | |
The latest VIPRE report, detailing the ten most prevalent malware threat detections spotted by [GFI Labs](http://malwareprotectioncenter.com/) and the ThreatNet Detection System, reveals that Google, LinkedIn, Skype and Mass Effect 3 were amongst the big brands being exploited by cybercriminals in order to leverage trust whilst distributing malware-laden emails. As a … ![]() | |
Wednesday 6th June 2012 is [URL="http://www.worldipv6day.org/"]World IPv6 Launch Day[/URL] (no, seriously, it is) and, we have been continually reminded in a Chicken Little fashion, the IPv4 address space sky is falling. The fact that the media obsession with Internet addresses running out has been on-going for at least a decade … ![]() | |
China may be odds-on to top the medal table at the London 2012 Olympic Games, with less than a week to go, but according to a new report South Korea has the Chinese well and truly beaten as far as malware infected PCs are concerned. And unlike at the Olympic … ![]() | |
New research shows that hackers are becoming increasingly lazy in their search for online exploits, with 98% of Remote File Inclusion and 88% of SQL injection attacks now being fully automated. It comes as no surprise whatsoever to DaniWeb administrators and moderators that your average cybercriminal is looking for the … ![]() | |
When you look at the iTunes download charts you will always find an Angry Bird perched towards the top. That's quite simply because this game app has been the undoubted number one commercial and cultural success story of the App Store. The app developers, Rovio, have been accused in the … | |
FireEye security researchers are warning that they have [detected a new zero-day vulnerability](http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html) that is being used successfully in the wild against browser clients with both Java 6u41 and Java 7u15 installed. Given that the Java 7 update was only released a couple of weeks ago, this is yet more … | |
Re: Given that MICHAEL is a student, and all the endorsing accounts which have posted are using the same IP address (which points to a CENIC ISP based in Irvine, California) it could well be that they are fellow students at the same school using the same network. Assuming that the … | |
Reports are coming in thick and fast about 'state-sponsored' zero-day exploits hitting business websites in the UK. The latest, disclosed yesterday by [SophosLabs](http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/), involves an as yet unnamed European aeronautical parts supplier and follows on from another the day before involving a European medical company site. In both cases the … | |
Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and … | |
Re: 1. Keep it pleasant. Resorting to immature name calling is no way to make a point, well not if you expect anyone to take you seriously dude. 2. DaniWeb does not delete accounts, nor does it delete posts unless they break the rules. If you no longer wish to be … | |
Re: Have you contacted Dell tech support? | |
| |
With Twitter now more than 100 million accounts strong, and with 50 million Tweets per day, you might be excused for thinking there's no stopping the micro-blogging network. Until, that is, you start exploring the darkside of Twitter. But is Twitter evil? [attach]16201[/attach]You only have to look at the IT … | |
Whether you travel on business or for pleasure, the chances are pretty high that you will make use of the Internet while abroad. If you are staying at a hotel then, given the high cost of international data roaming on most mobile networks, the chances are that you will make … ![]() | |
The news wires have been buzzing over the weekend after it emerged that the Raspberry Pi website had been hit by a 'million zombie' Distributed Denial of Service (DDoS) attack during the week. Although the outage was relatively brief, with the Raspberry Pi Foundation admitting the attack with a Twitter … ![]() | |
Microsoft Security Advisory notices do not, as a rule, make the media sit up and take much notice. Not least as they have become relatively commonplace over the years, but every now and then one comes along which may grab some press attention. Take [MSA 2718704](http://technet.microsoft.com/en-us/security/advisory/2718704) for example.  … ![]() | |
With the London 2012 Olympics due to open in just a few days time, the expected push by the bad guys has started. No, I don't mean the banning of wearing Pepsi T-Shirts in the Olympic Stadium as it might upset official sponsors Coke, or the fact that nobody is … ![]() | |
An ongoing attack aimed at users of the Apple Mac platform is being reported by security researchers. [AlienVault,](http://www.alienvault.com) which has discovered these weaponised attacks in the wild, warns that regular Mac users without IT security software installed could be at risk of infection and hijacking.  The researchers suspect … ![]() | |
Re: I think the good professor may be enquiring as to the best way to post spam on DaniWeb. I might be wrong, but... | |
According to security experts at data governance outfit Varonis, 2013 will be the year of the salami attack. On the plus side, they also predict that the world will not come to an end on December 21st 2012. It's not just salami that your business needs to worry about in … | |
Earlier this week, an iPhone jailbreaking guru called pod2g revealed how even the very latest beta versions of iOS 6 cannot prevent the iPhone from being vulnerable to SMS text message spoofing. This technique is often employed by spammers and scammers alike when targeting the smartphone user in order to … ![]() | |
It has been a day of coming and going at Google, it seems. Saying hello, again, was Gmail in the UK while Google Docs offline access through Google Gears has waved goodbye. You might think that Gmail had never left the UK, but the truth is that apart from a … | |
Continuing our round up of 2013 IT security vendor predictions, we've got the thoughts of three of the big Infosecurity Europe exhibitors: Palo Alto Networks, SafeNet and Kaspersky Lab.  Brian Tokuyoshi from Palo Alto Networks predicts that social media, data decryption and virtualised network security will be high … ![]() | |
Anonymous hacktivists took aim at the websites of the UK Justice Department, the Department of Work and Pensions, the Home Office and even the Prime Minister's own Number 10 site. All of them were successfully targeted overnight and went down for a period of time. The attacks were part of … ![]() | |
Re: well they may have done three years ago, yes. Not so relevant now though... | |
Over the weekend I wrote a news story for DaniWeb which revealed how the iPhone was vulnerable to SMS text message spoofing. This went under the title "[Why Apple was right about iMessage 'fix' for iPhone SMS spoofing](http://www.daniweb.com/hardware-and-software/apple/ios-iphone-os/news/431373/why-apple-was-right-about-imessage-fix-for-iphone-sms-spoofing)" because, simply put, SMS text messaging is exposed to this kind of … ![]() | |
First we had the news that [URL="http://www.daniweb.com/news/story276878.html"]IBM was helping clean up crime[/URL] in the US and UK, now it seems that Sweden is getting a touch of the Big Blue Brother effect. The city of Stockholm is launching a project using IBM's streaming analytics technology in order to gather real-time … ![]() | |
I am pleased to report that DaniWeb, based about half an hour outside Manhattan in Uniondale, Long Island, New York has survived Hurricane Sandy. There were no downtimes or outages, and all staff are OK. Not everyone in the tech space has been so lucky it would seem.  … | |
Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages … ![]() | |
Re: The endorsement system works best if you only endorse people in those forums where they have demonstrated skills worthy of being endorsed. In my opinion. If it just becomes a 'personality meter' then it is devalued. | |
New research from ISACA suggests that US consumers with 'work-supplied' computing devices intend, on average, to spend nine hours shopping for gifts on them during the forthcoming holiday season. When it comes to the Bring Your Own Device (BYOD) brigade, those who use personal mobile devices for work, that average … ![]() | |
Re: please do not spam here ![]() | |
Re: So you link to a site which has a GREAT BIG BUTTON saying 'find out more' which when clicked tells you all you need to know about the dedciated server options on offer, yet you say you want to know more about dedicated servers? Odd. Anyway, I've deleted the link … | |
Re: And that's like World of Warcraft how exactly? | |
Security vendor Malwarebytes has reported that a new variation of an old password stealing Trojan is out in the wild, but all is not as it may seem. Notably, this particular Trojan is signed with an apparently 'genuine' digital certificate that authenticates the file. Which rather prompts the question: "say … ![]() | |
...and the Microsoft AJAX Library, err, and the ASP.NET AJAX Control Toolkit. Yep, Microsoft has not only finally come up with an official name for the AJAX technologies which until now have been known collectively as ‘Atlas’ but has also split it into three individual products. All are expected to … ![]() | |
IT Security experts Barracuda Labs recently researched the business of selling Twitter followers to those companies which cannot wait to build organic follower growth. Despite the purchasing of Twitter followers being an explicit breach of the Twitter terms and conditions of use, punishable by the deletion of the account concerned, … ![]() | |
Re: By revealing the base that you construct your password from, you have just weakened it considerably despite the use of mixed case, numericals and special characters (assuming that someone really wanted to crack your password, and that information regarding your past relationships can be found online). Using the same thing … | |
Re: Don't forget: Rainbow Hat = throw everything at your SEO efforts regardless of shade |
The End.