Member Avatar
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
Action video camera vendor GoPro has announced that it is riding into the Tour de France with a promotional ... to celebrate being named the official camera of the world's largest annual sporting event with a worldwide television audience of some 4 billion people, but not before the BBC ... …
by happygeek 1,589 in Hardware ()
Member Avatar
Earlier this month, security outfit FireEye’s 'FireEye as a Service' researchers out in Singapore ... on a phishing campaign that was found to be exploiting a zero-day in Adobe Flash Player vulnerability (CVE-2015-3113). That campaign has been well and truly active for a while now, with attacking emails including links …
by happygeek 1,589 in Web Development ()
Member Avatar
A couple of decades ago, in another life, I wrote a little script which would capture keystrokes and then store that data within the 'white space' of an image file. It was pretty crude, but it was also twenty years ago and to be honest nobody was really looking for …
by happygeek 1,589 in Information Security ()
Member Avatar
The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' ... and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or …
by happygeek 1,589 in Community Center ()
Member Avatar
Speaking to TrustedReviews this week, Alexander Moiseev, Kaspersky Europe's Managing Director, has warned that your car is at serious risk of being hacked. He is, however, wrong and I'm going to explain why. ... Kaspersky Lab and Mr Moiseev may well insist that the threats to the automotive industry are …
by happygeek 1,589 in Community Center ()
Member Avatar
As ... that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during ... , Philip Lieberman, President of privileged identity management specialists ... , has been talking about what went wrong. Here's what he had …
by happygeek 1,589 in Community Center ()
Member Avatar
It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, ... would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of …
by happygeek 1,589 in Software Development ()
Member Avatar
Researchers at security company AppRiver have issued a ... regarding a variant of the Fareit malware family which is using fake Amazon purchase confirmation emails to inject itself and steal any type of crypto currency that can be found on the target machine. ... Troy Gill, manager of security research …
by happygeek 1,589 in Community Center ()
Member Avatar
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the …
by happygeek 1,589 in Community Center ()
Member Avatar
While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye ... that ... had managed to create profiles and posts on TechNet that contained embedded Command and Control codes for use with a BlackCoffee malware variant. This …
by happygeek 1,589 in Software Development ()
Member Avatar
It's all too easy to think that spam is an old problem, and one that has largely been dealt with. Certainly, many people will tell you that they see very little evidence of spam in their mailboxes. This, however, has less to do with the demise of the spammer and …
by happygeek 1,589 in Community Center ()
Member Avatar
My van was built 15 years ago by Mazda in Japan as a multi-purpose 'people carrier' vehicle with the unlikely name of a Bongo. It has survived the years well, and I have now converted it into a camper van. Another 15 year old that travelled across the globe has …
by happygeek 1,589 in Information Security ()
Member Avatar
Advert blocking software is thought to be used by something in the region of just five per cent of online users, or 150 million people of you prefer. It is, however, on the up; research conducted by Adobe and anti-adblocking campaigners PageFair suggests that ad blocking use rose by 70 …
by happygeek 1,589 in Digital Marketing ()
Member Avatar
As any fan of the The Matrix trilogy of films will tell you, the Keymaker is a character in The Matrix Reloaded who has the keys to provide Neo access to the system mainframe and by so doing hopefully save Zion from the ongoing sentinel attack. In the movie, the …
by happygeek 1,589 in Mac OS X ()
Member Avatar
Werner Vogel, Amazon Web Services (AWS) CTO, speaking at the AWS Summit in London yesterday has made the rather amazing claim that security in the cloud is "much stronger" than anything you can have on-premises. As someone who has been writing about information security for more than 20 years, and …
by happygeek 1,589 in Networking ()
Member Avatar
In what has quite possibly been one of the longest periods between security problems being revealed and action being taken, the Virginia Board of Elections voted on Tuesday to remove the certification of more than 300 AVS WINVote touchscreen voting machines. The Virginia Information Technology Agency, and consultancy Pro V&V, …
by happygeek 1,589 in Community Center ()
Member Avatar
According to the latest ... all but four per cent of the security incidents analyzed by researchers could be accounted for by just nine basic attack types. That's pretty useful information for enterprise looking to prioritize their approach to security in terms of establishing a stronger security posture. So, as …
by happygeek 1,589 in Community Center ()
Member Avatar
According to a ... dated April 10th, researchers Anton Ivanov, Andrey Khudyakov, Maxim Zhuravlev and Andrey Rubin discovered a vulnerability in the Darwin kernel back in December 2014. Why is this of interest? Well, the Darwin kernel is an open source part of both the Apple operating systems. The vulnerability …
by happygeek 1,589 in Mac OS X ()
Member Avatar
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …
by happygeek 1,589 in Web Development ()
Member Avatar
According to new research from Venafi, apparently some 74 percent of 'Forbes Global 2000 organizations' (or the big boys of business if you prefer) have yet to properly secure their public facing servers against the Heartbleed OpenSSL threat. That's a year after the thing broke for goodness sake! Venafi found …
by happygeek 1,589 in Networking ()
Member Avatar
Security is, more often than not, a case of getting the basics right. This is certainly true of the cloud where the hyperbole surrounding insecurity far outweighs the actual risk in my opinion. Not that the cloud is an inherently secure place to store data, just that it poses similar …
by happygeek 1,589 in Hardware and Software ()
Member Avatar
Which 12 year old operating system which is still running on 11 million servers is about to die? Yep, that's the one: Microsoft Windows Server 2003 reaches 'end of life' status on July 14th. One of the longest running discussions on DaniWeb asks the question ... and I have my …
by happygeek 1,589 in Microsoft Windows ()
Member Avatar
It's that time of year again, and the latest ... has been published. This analysed anonymous data gathered from scans right across 2014 of millions of computers which have Secunia Personal Software Inspector (PSI) installed and revealed some interesting statistics. On average, the computers used by the people running PSI …
by happygeek 1,589 in Microsoft Windows ()
Member Avatar
The recently revised Facebook community standards page states that the social network is on a mission "to give people the power to share and make the world more open" however it appears that it may have been giving the wrong people the power to share stuff you thought was private. …
by happygeek 1,589 in Digital Marketing ()
Member Avatar
Halifax is the town in West Yorkshire where I live, and it also happens to be the name of a well known UK Bank which started life there. Best known on the this side of the pond for TV adverts featuring a friendly chap called Howard Brown, a former customer …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
I don't usually write about acquisitions and all that financial stuff, but news that PayPal has acquired CyActive caught my eye as apparently this brings the promise of 'bio-inspired predictive security' into the online payments provider threat protection mix. Which made me think, just what the heck is bio-inspired predictive …
by happygeek 1,589 in Digital Marketing ()
Member Avatar
Content Management Systems (CMS) may not be the most interesting topic on the tech table, but oh boy does WordPress liven things up in this sector. Not, it has to be said, always in a good way. I've lost count of the number of WordPress vulnerability stories that I've read …
by happygeek 1,589 in Web Development ()
Member Avatar
Spring has been getting rather unseasonably hot for Apache users as far as security flaws go. First there was news of how the FREAK (Factoring Attack on RSA-EXPORT Keys) vulnerability could impact Apache. For more on FREAK see this ... by Matthew Green, a cryptographer and research professor at Johns …
by happygeek 1,589 in Web Development ()
Member Avatar
Addressing last weeks Securi-Tay conference hosted by the Abertay Ethical Hacking Society in Scotland, Stephen Tomkinson from the NCC Group detailed how Blu-ray players can do more than play videos; they can open up a new attack surface for the hacker. Tomkinson demonstrated a new tool that had been released …
by happygeek 1,589 in Software Development ()