5,261 Posted Topics
How stupid do you have to be to get caught by spam email with the subject line of 'we caught you naked [your name] - check the video' is a question I have been asking myself today. Not because I have been caught naked, and if I had my only … | |
Research by security as a service specialists [URL="http://www.scansafe.com"]ScanSafe[/URL] has proven something that pretty much everyone knew already: namely that people working at home are more likely to view online pornography than those stuck in an office somewhere. I mean, it hardly needed a survey to dig up that little gem, … | |
Re: But you are not a woman <runs and ducks> :) | |
[URL="http://www.itpro.co.uk/news/187851/apple-iphone-vulnerable-through-safari.html"]According to IT Pro[/URL] the Apple iPhone is vulnerable to Denial of Service attacks. These can occur when an iPhone user opens a JavaScript containing HTML page which triggers the vulnerability. An application Denial of Service attack can then crash the Safari browser on the phone, and quite possibly the … | |
Rather surprisingly, Kaspersky Lab has forecast that the security threat landscape will increase by more than 20 million programs by the end of 2008 when compared to the 2007 year-end figures, a ten-fold increase no less. That is worth repeating: the number of [B]new[/B] malicious applications in circulation by the … | |
According to [URL="http://www.itpro.co.uk/news/186540/the-security-business-has-no-future-says-ibm.html"]reports[/URL] the general manager of Internet security with IBM has warned that "the security business has no future." Speaking at the RSA conference in San Francisco, IT Pro says, Val Rahmani warned that the enterprise must fundamentally change security strategies if it is to have any success within … | |
[URL="http://news.yahoo.com/s/pcworld/20080408/tc_pcworld/144243"]News is breaking[/URL] that the European Commission could push for laws to restrict the personal search data held by search companies to no longer than six months, after which it must be discarded. The EC Article 29 data Protection Working Party seems to be heading for a confrontation with search … | |
Re: I would have looked at it from Jan 2007 plus 3 years equals Jan 2010, within 12 months of April 2008 equals before April 2009. So the dates are wrong, by some 9 months - or put another way, nearly a year :) | |
There are lies, damned lies and statistics. Or something like that. However, there are also some really interesting figures emerging about online life right now which are worthy of repeating here. How about [URL="http://community.zdnet.co.uk/blog/0,1000000567,10007735o-2000537720b,00.htm"]this report[/URL] that the numbers of web sites on the Internet has risen from, can you believe … | |
It should come as no surprise that the upcoming 'Patch Tuesday' from Microsoft should include critical patches covering the likes of VBScript and Jscript implementation in Windows 2000, XP and 2003. However, [URL="http://www.itpro.co.uk/news/184764/not-even-vista-sp1-escapes-next-patch-tuesday.html"]some reporters[/URL] have expressed just a little astonishment that both Windows Server 2008 and Vista SP1 are also … | |
[URL="http://www.fortiguardcenter.com"]According to unified threat management specialist Fortinet[/URL] Facebook users had better start paying attention to the postings that appear on their message wall within the popular social networking site. It appears that spammers are moving away from targeting third party applications, as evidenced in the recent 'Secret Crush' case, and … | |
Security provider Webroot has today published its [URL="http://www.webroot.com/En_GB/land-sois-home.html"]State of Internet Security: Protecting Business Email[/URL] research report and estimates that every single business email account will receive some 42,000 spams during the course of 2008. Or 116 junk messages every single day if you prefer. That is an increase of some … | |
I am not an easily shockable person. Anyone who knows me, anyone who has seen me, will understand this. Indeed, other than the usual trio of sexual or racial abuse and mindless violence it takes a lot to drop my jaw in shame and despair while browsing the web. However, … | |
[URL="http://googleblog.blogspot.com/2008/03/insight-into-youtube-videos.html"]Google has today announced[/URL] the launch a tool to answer the kind of questions anyone posting video clips to YouTube are always asking, such as: who viewed my video, how did they find it, where did they come from? YouTube Insight is free, and enables anyone with a YouTube account … | |
Researchers at web gateway security specialists [URL="http://www.finjan.com"]Finjan[/URL] have uncovered an underground crime data exchange service which is highly sophisticated in nature. The exchange, known as SellCVV2, promotes the sale of fraudulent credit card data, offering not only volume discounts for fraudsters with bigger ambitions, but guarantees as well. According to … | |
Computerworld is [URL="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9071638&source=rss_news6"]reporting the possibility[/URL] of a worm or bot in the wild that is specifically targeting D-Link branded routers. It refers to a three year old vulnerability which Symantec security researchers believe is being exploited by a new exploit. Apparently, the Symantec security response team has seen an increase … | |
[URL="http://www.itpro.co.uk/news/181083/microsoft-offers-free-vista-sp1-support.html"]According to IT Pro[/URL] Microsoft has done a u-turn when it comes to charging users for installation or compatibility support with regard to Vista SP1. It says that Microsoft is now "offering free support to any Windows Vista SP1 user experiencing problems." Quoting Microsoft MVP Brandon LeBlanc, it reports "you … | |
According to [URL="http://www.news.com/8301-13578_3-9899151-38.html"]recent reports[/URL] the FBI has been using honey-trap hyperlinks which claim to lead to child pornography in order to entice offenders into clicking them. Last year, it seems, armed raids were carried out on homes in Nevada, New York and Pennsylvania as a direct result of such link … | |
[URL="http://www.frsirt.com/english/advisories/2008/0928"]FrSIRT[/URL], the French Security Incident Response Team, has reported that multiple vulnerabilities have been identified in various IP-PBX software applications that can be exploited by attackers to bypass security restrictions and cause denial of service attacks or otherwise compromise vulnerable systems. The software is used by an ever increasing number … | |
File under: shock, horror or perhaps irony. According to a press release from [URL="http://www.gss.co.uk"]Global Secure Systems[/URL] that I received today, it has "uncovered the alarming reality that UK school children are studying social networking websites during their lessons instead of what they should be concentrating on." In fact, the release … | |
[URL="http://po-ru.com/about/"]Paul Battley[/URL] is a software developer from London who can probably lay claim to being the biggest thorn in the side of the BBC right now. No sooner had the mighty British Broadband Corporation [URL="http://news.bbc.co.uk/1/hi/technology/7293988.stm"]announced[/URL] that his hack which allowed people to download iPlayer TV streams meant for an iPhone … | |
Ever wondered just how smart a smartcard is, from the security perspective? Obviously there are problems as detailed in a DaniWeb blog posting last month which described how hackers can [URL="http://www.daniweb.com/blogs/entry2115.html"]exploit hardware RFID weaknesses to access credit card account data[/URL] for example. But now a former member of the team … | |
According to reporters at [URL="http://www.pocket-lint.co.uk/news/news.phtml/13450/14474/Manhunt-2-given-UK-release.phtml"]Pocket Lint[/URL] it would seem that the controversial ban upon the sale of the equally controversial video game Manhunt 2 in the UK has been overturned. The site reports that the Rockstar Games developed title has been edited to the satisfaction of the British Board of … | |
According to a newly published [URL="http://www.secure-medicine.org/icd-study/icd-study.pdf%20target="]research paper[/URL] from the Harvard Medical School backed Medical Device Security Center, it appears that hackers could use wireless technology to turn off heart pacemakers. As unlikely as it sounds, the boffins reckon that people with an implantable cardiac defibrillator (or pacemaker as they are … | |
Anyone with an interest in the history of computing will know that the first mechanical computer was invented by one Charles Babbage, British mathematician and visionary. If you happen to be in the vicinity of the Science Museum in London you can even see a working difference engine, something Babbage … | |
Scientists at IBM have finally managed to get around the problem of electrical interference that prevented signals from working correctly while using the carbon mesh material of grapheme. It means that they can now get on with the job in hand of building nanoscale transistors according to this [URL="http://www.technewsworld.com/rsstory/62064.html"]report[/URL]. | |
The [URL="http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/03/11/BU10VHR0N.DTL&type=business"]San Francisco Chronicle reports[/URL] that Google has finally got the go ahead from European regulators to close the acquisition of DoubleClick for $3.1 billion. The deal has immediately been closed, therefore, as the decision by the European Commission removes the last hurdle standing in Google's way. | |
The New York Times ran an interesting story yesterday with the title of [URL="http://www.nytimes.com/2008/03/10/technology/10dvd.html?_r=1&ex=1362888000&en=12fee4822b2e6c26&ei=5090&partner=rssuserland&emc=rss&oref=slogin"]Another DVD Format, but This One Says It's Cheaper[/URL]. Essentially, a London based company has come up with an alternative to Blu-Ray just when you thought that particularly bloody consumer battle had been laid to rest. The … | |
Think of where your spam comes from and the usual suspects, according to most surveys of such things by the security and messaging experts, turn out to be the good old US of A, Russia and China which between them accounted for 33.8 percent of all spam in the last … | |
According to an [URL="http://ap.google.com/article/ALeqM5hVyPFIJPx8NKAzElk21Isx-zQxvgD8VAQTSG0"]Associated Press story[/URL] just hitting the wires, Wal-Mart is to stop selling computers running the Linux operating system after less than 5 months because, to quote Wal-Mart spokeswoman Melissa O'Brien "This really wasn't what our customers were looking for." | |
Re: I tend to agree, and always use the wifi option on my Nokia N95 8GB where I can in preference to the 3.5G mobile broadband for just that financial reasoning. Plus wifi tends to be more reliable/stable. | |
According to messaging security experts [URL="http://www.messagelabs.com/intelligence.aspx"]MessageLabs[/URL] there has been a 100 percent rise in the amount of spam from Gmail during February, along with a worrying 200 percent increase in targeted Trojan attacks. The February MessageLabs Intelligence Report, published today, paints a sorry picture as far as IT security is … | |
According to the Guardian newspaper, the much publicised reports circulating online and in the global print media that Sir Paul McCartney has struck a deal to put the Beatles back catalogue up for download on iTunes this year is simply not true. The story is that Sir Paul has agreed … | |
[URL="http://www.techcrunch.com/2008/03/07/iphone-sdk-some-of-the-details-arent-great/"]TechCrunch[/URL] has highlighted a swathe of restrictions facing developers who want to get their applications onto the iPhone platform following the release of the Apple iPhone SDK. Instead of all the billowing hype in the blogosphere about how wonderful Apple is for releasing the SDK, perhaps developers might want to … | |
Bruce Schneier is a security legend, and posts like [URL="http://www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0306"]this one[/URL] go a long way to proving just why. In this Wired commentary Schneier gives the best explanation I have seen as to why the ‘transparent society’ argument is a myth, why it is not better than privacy but rather … | |
The Trend Micro [URL="http://blog.trendmicro.com/over-400-phish-kits-on-the-loose/"]TrendLabs Malware Blog[/URL] is reporting that the volume of totally free do it yourself phishing kits available in the wild on the web had moved past the 400 mark. Ironically, some are even used by phishers to phish other phishers… | |
According to [URL="http://www.myWorkLight.com"]WorkLight[/URL] newly published [URL="http://www.guardian.co.uk/media/2008/mar/05/digitalmedia.youtube?gusrc=rss&feed=networkfront"]research[/URL] into the success of social networking sites such as Facebook released this week proves the business interaction case for using these portals at work. Given that WorkLight have the audacity to describe itself as an 'Enterprise 2.0 Company' my gut reaction is to think: … | |
According to a [URL="http://www.yougov.com"]YouGov[/URL] survey published today by [URL="http://www.verisign.com"]VeriSign[/URL] the average UK consumer is worth £10,077 ($20,000) online in terms of banking, gaming and shopping accounts. The pan-European survey on consumer attitudes to online security concludes that UK Internet users are putting as much as £361 billion ($720 billion) at … | |
A hearty slap on the back must go to authorities in South Korea who have [URL="http://www.sophos.com/news/2008/03/lee-shin-ja.html"]arrested and charged[/URL] the 41 year old ex-CEO of an antivirus software company with distributing fake security scareware. Lee Shin-ja was formerly CEO with security outfit Media Port, and stands accused of distributing the 'free' … | |
According to the [URL="http://www.timesonline.co.uk"]Sunday Times[/URL] one couple got more than they bargained for courtesy of the almost extortionate charges that mobile phone companies are allowed to levy in Europe when it comes to sending text or data while 'roaming' away from your home country. Although the case in question might … | |
The Cult of the Dead Cow, the infamous hacking collective, has released a Google hacking utility called Goolag Scan that brings the ability to search the information engine for web-based data that is normally hidden to anyone wannabe with a web browser and half a brain. It does this by … | |
According to the Pakistan Telecommunications Authority (PTA) while the blocking of the YouTube website over the weekend in Pakistan was intended the worldwide outage that saw the popular video streaming service become unavailable to huge swathes of the planet was accidental. Anyway, PTA spokesman Khurram Mehran assures us it is … | |
Last year I [URL="http://www.daniweb.com/blogs/entry1466.html"]exposed[/URL] a security breach involving the online collection of applications for visa documents allowing Indian citizens to visit the UK, an expose that ended up with the [URL="http://www.daniweb.com/blogs/entry1817.html"]UK government itself being found guilty[/URL] of breaking the Data Protection Act and which kick-started something of a sea change … | |
It is not often that a drunken discussion provides anything more than a hangover the following morning, but recently a bunch of IT security experts got talking while the beer was flowing and someone asked the question: what is the biggest threat on the IT landscape today? Everything from 'the … | |
It has been estimated that something in the region of 70 percent of the ATMs in current use are based not on the proprietary hardware, software and communication protocol platforms of old but instead on PC/Intel hardware and commodity operating systems, the most popular being Windows XP embedded. In fact, … | |
IT security and control outfit [URL="http://www.sophos.com"]Sophos[/URL] has revealed the results of a poll that shows the number of people who believe that Apple Macs will be increasingly targeted by cybercriminals in the future has risen from 79 percent two years ago to 93 percent now. Sophos undertook the poll as … | |
Security researchers at [URL="http://www.sophos.com"]Sophos Labs[/URL] have revealed that nearly 70 percent of all Linux honeypot infections are caused by a single virus. Perhaps even more shocking, all things considered, is the fact that the virus in question, Linux/Rst-B, is actually six years old now. So concerned is Sophos at this … | |
It has been a couple of months now since a Russian security researcher, Evgeny Legerov, confirmed that the widely deployed media software RealPlayer was vulnerable to a zero-day exploit. The Russian company, Gleg, is in the business of selling information on such exploits and security flaws. Unfortunately, according RealNetworks's Vice … | |
Oh the irony. Windows Vista Service Pack 1 is, quite rightly, being pushed hard on the merits of the numerous security improvements over the original release. However, despite the fact that Vista SP1 will not be made available to end users until March, because it has just been released to … | |
Today sees the official formation of the Anti-Malware Testing Standards Organization ([URL="http://www.amtso.org"]AMTSO[/URL]) which has come about following an industry wide concern about the lack of any real-world standards that apply to anti-malware solutions when it comes to testing. Why is this important? Because unless the testing methodologies used to evaluate … |
The End.