Member Avatar

Responses (from another site) on my recent, "[URL="http://www.daniweb.com/news/story261566.html"]Security Alert: They Should Have Used Linux[/URL]" led me to explore the conclusion that hacking is really only for those seeking the low-hanging security fruit as their prey. These folks, who tout themselves as "Linux Experts" intrigued me so much with their comments that I'm compelled to write this post as an analysis of that dialog. One said that, "Hacking is a business. [URL="http://www.microsoft.com"]Windows[/URL] is targeted because of the size of the target... combined still over 90%, and XP allegedly *still* 65%+." Still another asserted that, "Windows is the most attractive target for …

Member Avatar
0
2
Member Avatar

It seems that Google searches on terms that are related to iPhone SMS information are being used to return results that direct unsuspecting users to rogue AV sites. According to the Websense Security Labs ThreatSeeker Network [URL="http://securitylabs.websense.com/content/blogs.aspx"]blog[/URL] malicious URLs related to Apple iPhone SMS/MMS searches are ranking as high as result number six. Examples of the kind of searches that are being poisoned include "iphone how to send multiple chats over sms" amongst others. Websense researchers have tracked the infection trail should a user click on a link controlled by the attackers using this particular rogue antivirus coupled to SEO …

2
1
Member Avatar

There are two things you can be sure of about the annual Las Vegas Black Hat security conference: nobody will use the free wifi as they are all too [URL="http://www.itwire.com/content/view/19935/53/"]worried about being hacked[/URL], and someone will demonstrate an exploit that will scare the living bejesus out of you. The latter has just happened for[URL="http://www.daniweb.com/blogs/entry4558.html"] iPhone [/URL]users. One well known discoverer of such things, [URL="http://www.itwire.com/content/view/23941/53/"]Charlie Miller[/URL] from Independent Security Evaluators, has revealed how a vulnerability can give savvy attackers the ability to gain complete control over your iPhone without any action on the part of the victim. Yep, this is the …

1
2
Member Avatar

I guess that is what you might call a turn up for the books, as the US [URL="http://www.daniweb.com/blogs/entry1506.html"]Department of Homeland Security[/URL] announces the 16 members which have been sworn in to serve on the Homeland Security Advisory Council. Especially when you consider that one of them, Jeff Moss, is best known for being the founder of the [URL="http://www.itwire.com/content/view/19935/53/"]Black Hat[/URL] and [URL="http://www.itwire.com/content/view/19947/53/"]DEFCON[/URL] hacker conferences and something of a hero to the hacker community. At DEFCON there is even a 'spot the fed' competition where prizes are awarded for those who can pick out undercover FBI agents in the crowd. The official …

0
1
Member Avatar

There were quite a few interesting stories to come out of the recent [URL="https://www.blackhat.com/"]Black Hat[/URL] security conference in Las Vegas. If all you remember hearing about were the [URL="http://www.periscopeit.co.uk/news/article/web-monitoring-gets-hack-hackers-into-trouble/255"]ejected reporters[/URL] and [URL="http://www.cio.com.au/index.php/id;424905265"]DNS cache poisoning[/URL], then you missed a lot. Network and infrastructure security, the conference's focus, is a vitally important issue for today's businesses, and vulnerabilities associated with running virtualized environments turned out to be a huge topic. Christopher Hoff, chief security architect at Unisys, [URL="http://www.cio.com/article/442478/Black_Hat_The_Biggest_Virtualization_Security_Risks?page=1"]told attendees[/URL] at his presentation many users run headlong into virtualization solutions without being fully aware of the security consequences. Jeremiah Grossman, founder and chief …

0
1

The End.