1,400 Topics
![]() | |
According to the [URL="http://www.dcexaminer.com/local/012909-Ex-Fannie_Mae_worker_charged_with_planting_computer_virus.html"]DC Examiner[/URL] a former contract worker with Fannie Mae has been indicted, and bailed, on charges of computer intrusion. It is alleged that Rajendrasinh Makwana dropped a virus into Fannie Mae software which had the potential to cause millions of dollars worth of damage if it had … | |
The Mayor of London, the totally eccentric Boris Johnson, has written a column in a national newspaper in which he champions fellow loon [URL="http://www.daniweb.com/blogs/entry2863.html"]Gary McKinnon[/URL], the [URL="http://www.itwire.com/content/view/20017/53/"]NASA UFO hacker[/URL]. Currently busy fighting extradition to the USA on the grounds that, essentially, to do so would not be fair to someone … | |
I'm not talking about openssl, PHP, or even the Linux kernel but all the above plus every other program or bit of code on a Linux system. It's vulnerable. It's hackable. It can be changed at will by anyone because the source is open and freely available (the definition of … | |
Apple users opting not to grab a free 30 day demo version iWork 09, or even cough up the bucks for a full retail version, have found themselves getting more than they bargained for. It appears that something in the region of 20,000 people have downloaded a pirated version of … | |
Heartland Payment Systems, one of the biggest card payment processors in the US, has been the victim of what could well be the biggest security breach of its kind. Malicious software installed onto the Heartland network could have compromised as many as 100 million transactions according to numerous emerging reports. … | |
How many passwords do you have to remember? The common answer is either too many and I sometimes forget them, or alternatively just the one as I use it for everything. Both options are bad in terms of security. Which is where password management systems come in, and these can … | |
Security experts [URL="http://www.mcafee.com"]McAfee[/URL] confirm what we already know: when the [URL="http://www.daniweb.com/blogs/entry3023.html"]economy starts to hurt[/URL], the purveyors of malware jump in to increase the pain. With the revelation of it's 2009 threat predictions, McAfee looks ahead to a dismal year of continuing cyberthreats. Like I say, with no hint of surprise … | |
The Bush administration was [URL="http://www.gwu.edu/~nsarchiv/news/20090114/order_20090114.pdf"]ordered this week[/URL] to take a number of steps intended to help preserve email messages sent between 2003 and 2005 that had been thought to have been deleted -- but the way the court order was phrased offers a number of loopholes to avoid the intent … | |
If you are a Windows user and have not installed the [URL="http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx"]MS08-067 patch[/URL] from last October, then perhaps you had better pull your finger out. Of course, it could well be too late, and you could well be one of the nine million or so users who have already fallen … | |
It occurs to me that I've been talking a lot on this blog about data going missing here in the UK. I've given our Government and various people a hard time - if they cared what I said it'd hurt. I've said these things are managerial rather than technical. And … | |
I shudder when I look at some of the losses there have been in data and then the amount of people who complain that it's all down to computers. Here's a big secret; it isn't. Late last years someone bought a system on eBay which had loads of private information … | |
It looks ever more likely that 2009 could indeed be the [URL="http://www.daniweb.com/blogs/entry3781.html"]year of the scam[/URL]. Symantec owned MessageLabs is warning that cases of advance fee [URL="http://www.daniweb.com/blogs/entry1198.html"]419 fraud[/URL], along with other financial scams, have spiked as we enter 2009. From December 22nd 2008, through into January 2009, the number of scams … | |
A Harvard-based task force convened by 50 Attorneys General that spent a year researching the issue of sexual solicitation of children online has found out that there actually isn't a problem. According to the [URL="http://www.nytimes.com/2009/01/14/technology/internet/14cyberweb.html?_r=1&hp"]New York Times[/URL], which obtained a copy of the report from the Internet Safety Technical Task … | |
Gary McKinnon, the British hacker who is still fighting against extradition to the US despite the European Court of Human Rights ruling he should go, has played yet another card in his battle for justice in the UK. Apparently, lawyers representing McKinnon have told the British Crown Prosecution Service that … | |
A group of over 30 organizations including the Department of Homeland Security, Microsoft, and Symantec collaborated recently on a security project designed to identify the [URL="http://www.sans.org/top25errors//?cat=top25"]top 25 coding errors[/URL] programmers make when building Web sites. Since many of the mistakes can leave sites vulnerable to to cyber crime, it's a … | |
If you work in IT support you pretty much learn to expect the unexpected, but nobody could have seen some of these little gems, just [URL="http://www.pandalabs.com"]revealed[/URL] by the Panda Security tech support team, coming. For example, how about the customer who wondered if Panda antivirus software could be blowing the … | |
The [URL="http://www.e-victims.org"]E-Victims Organisation[/URL], a non-for-profit UK community interest company set up to benefit Internet users by assisting the victims of e-crime after the event, has released a top 10 Internet Scams of 2009 predictions list. Indeed, E-Victims.Org goes as far as to suggest that with new scams appearing almost daily, … | |
Cast your minds back a couple of years to 2007 and as far as hacking was concerned there was only really one big story, and I do mean big. The biggest reported case of cyber-criminals using hacking skill to steal something in the region of 40 million credit card details. … | |
All 43 police forces across England and Wales have now published crime maps on the Internet, according to the UK Home Office. This means that people can access details of crime in the areas they live in via the neighbourhood crime maps scheme. What a monumental waste of time and … | |
Under new a new law adopted in the UK, the British police are now permitted to access data stored on home computers without benefit of a search warrant. Worse yet, officers are allowed to hack into computers remotely without notifying its owner. Even though officials say these methods would only … | |
Sophos, the security outfit, has issued a [URL="http://www.sophos.com/blogs/gc/g/2009/01/04/phishing-scam"]warning[/URL] for users of Twitter to be on the lookout for an evolving phishing attack which could steal personal data if they are not very careful. Already thousands of Twitterers are thought to have received messages from their friends which invite them to … | |
[I]Instant karma's gonna get you Gonna knock you right on the head ~John Lennon. [/I] It's 2009 and I'm sure the powers that be at Microsoft are hoping it's going to be a good one without any tears, but even as the old year closed, the news kept getting worse … | |
Ever wondered what the most popular passwords being used are? Ever wondered what the crappiest, most insecure passwords being used are? Hey, you are in luck as it seems the two lists are exactly the same. The What's My Pass 'Top 500 Worst Passwords of All Time' [URL="http://www.whatsmypass.com/?p=415"]list[/URL] makes for … | |
According to an application vulnerability specialist, Fortify Software, HUB Computer Systems in the US has been hit by a $52,000 phone bill following the [URL="http://www.itexaminer.com/hacking-victim-hit-with-52000-phone-bill.aspx"]unauthorised access[/URL] of the company IP-enabled PBX by hackers. "The advent of IP-enabled PBXs, and the facility of remotely- programmable `conventional' PBX systems, means that hackers … | |
[URL="http://www.messagelabs.com"]MessageLabs[/URL] Intelligence data reveals that, in an announcement that will probably come as no shock to anyone who actually uses the Internet, the average [URL="http://www.daniweb.com/blogs/entry2459.html"]spam[/URL] level for the year managed to hit 81.2 percent. Perhaps a little more surprisingly, especially given the number of security vendor [URL="http://www.daniweb.com/blogs/entry3419.html"]warnings[/URL] throughout 2008, [URL="http://www.itwire.com/content/view/18997/53/"]malware … | |
Although you might think that your personal information, including your financial data, is hugely valuable to the cyber-criminal fraternity the truth would appear to be somewhat different. Security vendor [URL="http://www.trendmicro.co.uk"]Trend Micro[/URL] has published research which shows that at this time of the year, as we fast approach the climax to … | |
Oh terrific. Just when we thought things were winding down for the festive season, Microsoft users are advised not to use Internet Explorer until a major security vulnerability is plugged. Clearly I agree, but I'd add a second plea - when you've cross-graded to Chrome, Firefox, Opera or whatever else, … | |
It's an annual event: Churches and other facilities putting out creches and other displays for Christmas find parts of it -- typically the baby Jesus -- stolen, with both a financial and a sentimental cost. Now, those facilities are equipping their baby Jesuses with GPS in order to track them … | |
Forgive the guffaws of uncontrolled laughter from over here. I've just seen that the US Government - January Obama edition - is considering making IT security a matter for its specific attention and put someone in charge of Cybercrime. So why the laughter from the UK? Yes, I can understand … | |
[URL="http://www.daniweb.com/blogs/entry2289.html"]Facebook spam[/URL] is nothing news, nor for that matter is [URL="http://www.itpro.co.uk/blogs/daveyw/2008/01/03/one-million-facebook-users-exposed-to-zango-worm/"]Facebook malware[/URL]. While we are on a nothing new about Facebook theme, ever [URL="http://www.itpro.co.uk/blogs/editorial-blogs/davey-winder/922815/grownups-invade-facebook.thtml"]since grown-ups started to invade[/URL] the social network has suffered a tad from 'phoney friend syndrome.' I mean, come on, do you really think that [URL="http://www.itwire.com/content/view/20618/53/"]Barack Obama … | |
The IBM Internet Security Systems division, better known simply as ISS, has today warned of the 'perfect storm' of security threats which has been created by the global economic slowdown, an unprecedented level of cybercrime activity and both the cost and complexity of legal security infrastructures. ISS announced a set … | |
The fact that Apple is now encouraging people to use antivirus software on its systems is to be welcomed. I use a Mac myself but I'm regularly disturbed by the number of fellow users who refuse utterly to use AV because 'there aren't any viruses, they're all on the PC' … | |
Ever had some computer malware spit a bunch of porn onto your screen? Now imagine it happening in a roomful of schoolchildren. Now imagine it could send you to jail -- for forty years. That's what happened to Julie Amero, a substitute teacher in Norwich, Conn., in 2004. Using a … | |
If you ever had a big brother, you know that the same guy who gave you noogies could also protect you from a bully at school -- but you had to take the bad with the good. 'Big Brother,' in surveillance, is the same way. Government surveillance is getting easier … | |
The United States holds many titles, some of them causes for joy while others are reason for shame. The latter category has long included 'King of Spam' being the country from which the majority of the spam on the planet originates. However, thanks to the [URL="http://www.itpro.co.uk/blogs/daveyw/2008/11/20/spammers-are-in-a-world-of-hurt/"]closure of just one spam … | |
What happens when your security software thinks your operating system is out to get you? Users of AVG8 discovered the answer when it decided that a Windows XP user32.dll system file was infected with a Trojan, and deleted it. Uh oh Buck, biddly biddly biddly. What happens when you delete … | |
Isn't anything safe from hackers? Now they've apparently found a way to hack into systems through a media stream, threatening users with denial of service attacks that can bring down servers and desktops alike. The vulnerability was reported yesterday by VoIPshield Laboratories, a security tools maker in Canada. The flaws … | |
According to the fourth [URL="http://www.arbornetworks.com/report"]Worldwide Infrastructure Security Report[/URL] from Arbor Networks, published today, malicious attacks on networks are continuing to rise at an alarming rate. While that is no great surprise, the fact that during 2008 Distributed Denial of Service attacks have peaked at 40 Gbps most certainly is. Arbor's … | |
Hey, now that is pretty cool! Hot on the heels of a [URL="http://www.itwire.com/content/view/21585/53/"]report[/URL] suggesting that some 280 million people around the world have suffered some kind of data loss (through theft or incompetence mainly) during the last three years, Dell just might have the answer. It would appear to be … | |
In response to a letter signed by 40 state attorneys general, the popular classified ad site [URL="http://www.craigslist.org/about/sites"]Craigslist[/URL] has taken additional steps to keep sex workers from using its site. Left unsaid, though, is that Craigslist had little choice, unless it wished to risk being made a party to illegal activity. … | |
A Firefox developer has [URL="http://ehsanakhgari.org/blog/2008-11-04/dont-leave-trace-private-browsing-firefox"]revealed[/URL] that pre-release versions of Firefox 3.1 have been updated with a new feature. Officially called 'Private Browsing' it will be more familiar to many as the much talked about Porn Mode that [URL="http://www.itwire.com/content/view/20303/53/"]caused such controversy[/URL] when Microsoft announced it was being included within the forthcoming … | |
There are 5 things that every good Linux Administrator knows. Do you know what they are? They are in no particular order of importance: [B]1. Users are a Necessary Evil[/B] - Do you ever wonder why System Administrators seem so annoyed by you and your questions? It's because you are, … | |
It's ironic in many ways that UK firms are asking for more help with IT security. The link is [URL="http://news.bbc.co.uk/1/hi/technology/7702823.stm"]here[/URL] but that's the basics of it - Brits aren't happy with what the Government is doing to prevent Cybercrime, particularly in the business world. Well, OK, there's always more to … | |
According to a new [URL="http://www.FaceTime.com/survey08/summary"]report[/URL] by FaceTime, an Internet applications control specialist, the number of data leaks and malware incidents continues to rise as employees continue to embrace the whole Web 2.0 thing within the workplace. In fact, FaceTime says, the use of such applications is so widespread that some … | |
Here we go again. It seems like only last week (there's probably a reason for that) that I was at my desk talking about the amount of alarmist stuff about malware that's out there on the Internet. You know how it goes; someone proves in a lab that something can … | |
Security outfit MessageLabs today warns that as the credit crisis worsens so there has been a shift to the online arena for making money via spoofing banks for phishing scams. Between August and September this kind of phishing attack grew by 16 percent, but during September and October it has … | |
Sex on the Internet is nothing new, in fact it has been one of the great unspoken drivers of ecommerce and ecommerce technology over the years. Selling stuff on the Internet is nothing new, it too has been pivotal in driving online development. In particular, when you think of eBay … | |
The quick answer is no, at least according to well respected security guru and Chief Research Officer at F-Secure, Mikko Hypponen. The slightly longer answer is that dealing with organised crime on the Internet is not as easy as you might imagine, and bringing cyber criminals to justice can be … | |
The group [URL="http://www.stopinternetpredators.org/"]Stop Internet Predators[/URL], claiming that the Street View 360-degree technology can be used by pedophiles to help stalk their victims, is recommending that municipalities "[b]an Street View from your neighborhoods until it is safeguarded to ensure children's safety and privacy." How Google is supposed to do that, the … | |
The New York Times ran an in-depth article recently detailing the [URL="http://www.nytimes.com/2008/10/13/technology/business-computing/13thin.html?partner=rssnyt&emc=rss"]impact of thin client technology in the workplace[/URL]. The story takes a look at the reasons why the idea has had trouble getting off the ground during the last 15 years, and why it's suddenly gaining traction now. Author … |
The End.