1,400 Topics
![]() | |
According to a recent Kaspersky security research report, stolen [URL="http://www.daniweb.com/news/story237081.html"]Twitter accounts[/URL] are being sold on the black market for as much as $1000 a time. This really should not come as any great surprise given that the rapid [URL="http://www.daniweb.com/news/story231627.html"]evolution of social media[/URL] mirrors the rapid [URL="http://www.daniweb.com/news/story238033.html"]evolution of cybercrime[/URL]. The price … | |
Three men have been arrested, and what is thought to be a training site for hackers closed down, as Chinese officials get tough in the wake of the [URL="http://www.daniweb.com/news/story252590.html"]Google Gmail human rights hacking scandal[/URL]. While China has something of a history of being [URL="http://www.daniweb.com/blogs/entry4434.html"]tough on political activists[/URL], online [URL="http://www.daniweb.com/news/story235672.html"]multi-player gaming[/URL] … | |
It all kicked off last night with a [URL="http://hackersblog.org/2009/02/07/usakasperskycom-hacked-full-database-acces-sql-injection/"]posting to hacker board[/URL] claiming to have carried out a relatively simple SQL Injection attack on one the world's biggest and best known IT security companies: Kaspersky. The hacker, currently only know as 'unu' claims that the SQL Injection attack on usa.kaspersky.com … | |
Everything works great. But sometimes I get an Error message saying something about ip/port bindings. I don't have the traceback but this could cause problems down the road. Any suggestions? [code] #Backdoor Server #Version 0.3.0 #Every now and the I get an Error dealing with the ip/port bindings # seems … | |
Apple has this week released a software update for the iPhone which addresses a total of five security vulnerabilities. But not, it would seem, the small matter of a year old glitch which could turn your iPhone into a spyPhone. First the good news, Apple has released [URL="http://support.apple.com/kb/HT4013"]iPhone OS 3.1.3[/URL] … | |
In an [URL="http://www.guardian.co.uk/technology/2010/jan/24/computer-security-crime-anonymous-datasets"]interview[/URL] with The Observer newspaper, Dr Ian Brown from the Oxford Internet Institute who is writing a report on anonymous datasets for the European Commission warns that "criminals could identify individuals through mobile phone data and use the information to track people's movements and find out when they … | |
It doesn't take a search genius to go and find [URL="http://www.daniweb.com/news/story253418.html"]plenty of reports[/URL] of how Internet Explorer is, how can I put this nicely, [URL="http://www.itpro.co.uk/blogs/daveyw/2009/11/22/ie-6-and-7-hit-by-hack-attack-code/"]not exactly the safest bet[/URL] if you are looking for the most secure browsing experience. Quite apart from anything else it has the biggest market share … | |
I love mythology and there's nothing like hearing a technology myth to make my day complete. Just today someone applied one of the following myths in a conversation with me. I didn't say anything but it gave me the idea for this post. Here are the five myths related to … | |
I have a lot of passwords to get me onto various online sites and services, but I only need to remember one: the complex and hard to crack one that unlocks my encrypted password store. Not everyone is as paranoid as I am it seems, and many fall neatly into … | |
Yesterday [URL="http://www.daniweb.com/blogs/entry3943.html"]I reported[/URL] how the security vendor Kaspersky had allegedly fallen victim to a SQL Injection attack, with the usa.kaspersky.com website hacked and plenty of data potentially exposed. I said that Kaspersky would no doubt make an official statement sooner rather than later, and it has. Unfortunately it is one … | |
No sooner had the news of the untimely [URL="http://www.itpro.co.uk/blogs/daveyw/2009/06/28/that-michael-jackson-effect/"]death of Michael Jackson[/URL] hit the Internet than the vultures started circling. For once it was not the gossip columnists and tabloid journalists digging up the dirt, but rather spammers and hackers looking to exploit a golden opportunity to distribute their wares … | |
I would like to think that anyone watching, reading or listening to news reports of the unfolding tragedy that is post-earthquake Haiti could not fail to be moved first to tears and then prompted to want to do something. Most people have responded by asking themselves 'what can I do … | |
Internet security giant Symantec has just published the latest [URL="http://www.symantec.com/enterprise/theme.jsp?themeid=threatreport"]Internet Security Threat Report[/URL], based on an in-depth analysis of global Internet traffic and email during the last six months. Beyond all the usual who is hosting what and where, how much malware is contained in spam and which threats are … | |
Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. … | |
Google has signalled, in the strongest possible manner, that it will be pulling out of China unless something is done to address censorship of searches. It has also accused China of launching a "highly sophisticated and targeted attack" on the Google corporate infrastructure, along with another twenty large companies from … | |
Hello All, I am trying to lock some my video, picture, Excel and Word file in my PC by using Visual Basic. I am using Visual Studio 2008 to develop this application but I am unable to do this job. It'll be something like security utility application. Actually without me, … | |
Yesterday ReadWriteWeb reported that Facebook CEO Mark [URL="http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php?utm_source=feedburner&utm_medium=email&utm_campaign=Feed:%20readwriteweb%20%28ReadWriteWeb%29"]Zuckerberg told TechCrunch's Michael Arrington[/URL] people are not only OK with publicly exposing certain information on the open web such as their pictures and pages they subscribe to, Zuckerberg believes they are ready to give up privacy. [B]Really Mark?![/B] Amy Pohler and Seth … | |
Hello there fellow users, I have been entrusted with the task of designing and implementing a financial system for a charity foundation where I live. The charity foundation requires its work (addition and retrieval of records, for example) to be done online, using a web app. The app connects to … | |
i keep getting these pop up notifications with the red badge and white X on the bottom right of my computer. it won't allow me to open up any websites in Explorer. it also won't allow me to run any of my anti-virus and ad-aware software as if it's blocking … | |
The Obama Administration vows to cut costs in part by using open source software (Software whose source code is made available to the user), cloud computing, virtualization, Linux and other low cost technologies. But, does the use of open source software put the government, its records and our national security … | |
Hi, i am doing a project about key management and i need a good book that discusses key management in details, thanks for your help. | |
File under FAIL: social network widget maker RockYou has fallen victim to a SQL injection flaw and as a result some 32.6 million users are being urged to change their passwords as a matter of urgency. Security specialists Imperva discovered the problem at social networking development site Rockyou.com and issued … | |
Last month, a [URL="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555"]vulnerability in SSL and TLS[/URL] was announced. Almost immediately thereafter, it was [URL="http://www.securityfocus.com/news/11564"]successfully exploited to obtain Twitter account passwords[/URL]. The vulnerability affects most existing implementations of SSL 3.x and TLS 1.x in existing https web servers and browsers, but also in other servers that use SSL, such … | |
Thought that 2009 was [URL="http://www.daniweb.com/news/post975935.html"]the year that botnets died[/URL], well think again Batman, it was actually the year they bounced back. Compromised computers were responsible for distributing 83.4% of the 107 billion spam messages sent around the world, every single day, during 2009 according to a new Symantec report. Indeed, … | |
Still using Adobe Acrobat or Adobe Reader? Maybe it is time to switch to something that's not glowing red on the bad guy radar, or which is more securely coded depending upon how you look at these things. Yes, Adobe has admitted that there is yet another possible zero-day vulnerability … | |
Hello, I built a chat application that uses sockets and TCP/IP protocol. The client is an applet. The problem is I cannot connect the applet client with the desktop server application. [I]If I run the applet inside the applet viewer in NetBeans it works perfectly[/I]. I even tried the applet … | |
The Electronic Frontier Foundation has [URL="http://www.eff.org/files/filenode/social_network/social_networking_FOIA_complaint_final.pdf"]filed suit[/URL] against a number of government agencies for refusing to disclose their policies for using social networking sites for investigations, data-collection, and surveillance. The EFF is working with the Samuelson Law, Technology, and Public Policy Clinic at the University of California, Berkeley, School of … | |
With the reality of software security vulnerabilities coming into sharp focus over the past few years, businesses are wrestling with the additional risk that poor security introduces. And while the risk is becoming clearer, methods to defend applications from attack remain murky. Further clouding the picture, the responsibility for application … | |
Smaller businesses and people who use Hotmail as n email system or backup email system need to change their passwords - Microsoft has confirmed it's investigating a security breach. It seems that in spite of the industrial strength security everybody of any size applies to these systems - and let's … | |
Hi, I'm not sure if this is the right place for it. I'm thinking of creating a secure place on the internet. Some of my presumptions are: 1 - That no system/network is to be trusted. 2 - Important data should be encrypted. 3 - The link between data and … | |
According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse … | |
Hello all, I am a Computer Engineer, fresh off graduation, and I would like to educate myself on a broad range of technological fields and aspects. I am the kind of person who is easily distracted while reading from a screen, and so I would like to ask fellow daniweb … | |
I Found a problem on my site and when i compare the files on the server with my local files i found that every page (*.js or *.php) has this line on it <?php /**/eval(base64_decode('aWYoZnVuY3Rpb25fZXhpc3RzKC or a javascript line so i knew that my site has been hacked.. so 1 … | |
Here's a switch. Instead of newspapers trying to protect the identities of the people posting to their websites, the newspaper is the one outing them. As [URL="http://www.stltoday.com/blogzone/the-editors-desk/the-editors-desk/2009/11/post-a-vulgar-comment-while-youre-at-work-lose-your-job/"]described[/URL] by editor Kurt Greenbaum of the [I]St. Louis Post-Dispatch[/I], someone posted a vulgar word in the paper's online commenting system, and re-posted it … | |
[URL="http://www.checkpoint.com"]Check Point Software Technologies[/URL], developers of the ZoneAlarm security range, has announced the results of research which suggest that half of all staff will happily walk away from employment with competitive information about your business in their pockets. That they are walking straight into another job with it should be … | |
The Internet has shown that reputations are important but don't have to be tied to specific real individuals. The entire banking system is built on top of the idea of reputation, but tries hard to tie them to real identities. The problem of identity theft is likely to break this … | |
At my last, best count, there were over 550 individual Linux distributions. From the most generic, flat installs of the most common distros to ultra-specialized, multimedia-oriented to the eye-popping, fancy ones--they're all there for the taking. I found ten distributions from among the 500 or so that I know about … | |
I just had a Jaws moment. You know, you think it is safe to go back in the water and then a bloody great shark bites your legs off. Except in this case you can replace the sea with the Internet and the shark with the [URL="http://www.daniweb.com/blogs/entry4339.html"]equally dangerous Gumblar[/URL]. According … | |
I'm thinking of something to create to improve computer's classic software, maybe a higher level programming language than the actual, or a smarter OS, or maybe make expert systems improve with AI, etc ... On the other hand, Computers nowadays can be very helpful, but also can be used to … | |
Over the weekend news broke that a worm had started infecting Jailbroken iPhones in Australia. Nobody really took the exploit too seriously as all the 'ikee worm' did was change the phone wallpaper to a picture of 80's pop singer Rick Astley in a kind of warped tribute to the … | |
Botnets are, without any shadow of a doubt, one of the [URL="http://www.itpro.co.uk/blogs/daveyw/2009/09/30/death-taxes-and-botnets/"]biggest scourges[/URL] of IT security today. From sending spam to [URL="http://www.daniweb.com/news/story238033.html"]launching DDoS attacks[/URL] and distributing malware, botnets can be found [URL="http://www.daniweb.com/blogs/showentry.php?entryid=1021"]at the centre[/URL] of most of the security problems facing computer users right now. So wouldn't it be fun … | |
Here in the UK it is pantomime season. A peculiar form of traditional slapstick stage play that is performed during the Christmas season. In essence favourite tales such as Peter Pan, Aladdin, Jack and the Beanstalk and Aladdin are retold with the lead boy played by a girl and an … | |
According to the latest McAfee Labs [URL="http://www.mcafee.com/us/local_content/reports/7315rpt_threat_1009.pdf"]Third Quarter Threats Report 2009[/URL] instances of Distributed Denial of Service attacks are growing in popularity. In the last quarter the McAfee Labs observed many new attacks demanding ransom money including those aimed at sports betting companies which were taken out of action during … | |
I am considering how you can give access to support teams (service desk / second line) without allowing them on the server. How do you do it? | |
[I]"If we went into an “evil room” and had an “evil light” shined on us, and we then behaved in an “evil” way we would be destroyed… there is a fundamental trust between Google and its users.” ~Eric Schmidt, Google CEO [/I] Google released an exciting new product today called … | |
Microsoft on Tuesday is set to release six security updates, three of which it has deemed critical and apply only to versions of Windows other than Windows 7. Microsoft released advance notice of its [url=http://www.microsoft.com/technet/security/Bulletin/MS09-nov.mspx]Security Bulletin for November[/url], on Nov. 5. The bulletin itself will be released on Tuesday along … | |
Hello.....I had some nasties on this laptop that had no protection....I installed Kaspersky Anti-Virus and cleaned things up a bit....ran ATF Cleaner and Malwarebytes Ani-Malware- see log below....also see my HJT below.....can someone please take a look and see if I am still infected? Thanks very much.....JD Malwarebytes' Anti-Malware 1.41 … | |
Hi, I am quite new to the world of computers and am looking for some advice. I have a Server which is networked to 5 other machines. On this server we have private databases etc and i would like to password specific folders or indeed the whole hard drive of … | |
If you're yearning to break free from Apple-sanctioned iPhone carrier AT&T (and you don't mind trading your warranty for the privilege), then reach out and touch George Hotz. The iPhone hacker yesterday posted a [url=http://www.youtube.com/watch?v=g23e9e9zOVI&feature=player_embedded]video showing an iPhone call on T-Mobile[/url], and Wednesday is expected to post the code that … | |
[URL="http://www.symantec.com"]Symantec[/URL] has published one of those rare things - a report that contains an actual surprise. It seems some 4 million people have fallen for Scareware in the last 12 months. I'm stunned. Not because people are installing fake antivirus systems. That's a shame but in some ways it's inevitable; … |
The End.