679 Topics
![]() | |
[URL="http://www.theinquirer.net/gb/inquirer/news/2008/07/04/hundreds-thousands-laptops-left"]According to The Inquirer[/URL] a new report by the Ponemon Institute, rather appropriately sponsored by Dell, has revealed that an astonishing number of laptops are lost at airports across the United States on a weekly basis. Asking questions of 800 business travellers at some 106 major airports in the US, … | |
Sometimes I am left almost loss for words, and today is one of them. Judge Louis Stanton gave a ruling in the federal court for the Southern District of New York which has, quite frankly, dismissed the right to privacy of anyone who has ever watched a video clip on … | |
Remember the big fuss that spread all over the world when HM Revenue and Customs, the UK government department that deals with income tax and the like, managed to lose discs containing the financial details of 25 million people? amazingly, the official Independent Police Complaints Commission enquiry into the shameful … | |
According to the UK government, new proposals within the [URL="http://www.commonsleader.gov.uk/output/page2461.asp"]Communications Data Bill[/URL] are being put forward in order to prevent and detect crime as well as protect national security. The government argues that unless legislation is amended to reflect changes in technology, the ability of public authorities to counter criminal … | |
[URL="http://news.yahoo.com/s/pcworld/20080408/tc_pcworld/144243"]News is breaking[/URL] that the European Commission could push for laws to restrict the personal search data held by search companies to no longer than six months, after which it must be discarded. The EC Article 29 data Protection Working Party seems to be heading for a confrontation with search … | |
Last year I [URL="http://www.daniweb.com/blogs/entry1466.html"]exposed[/URL] a security breach involving the online collection of applications for visa documents allowing Indian citizens to visit the UK, an expose that ended up with the [URL="http://www.daniweb.com/blogs/entry1817.html"]UK government itself being found guilty[/URL] of breaking the Data Protection Act and which kick-started something of a sea change … | |
It has been estimated that something in the region of 70 percent of the ATMs in current use are based not on the proprietary hardware, software and communication protocol platforms of old but instead on PC/Intel hardware and commodity operating systems, the most popular being Windows XP embedded. In fact, … | |
For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, … | |
[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It … | |
If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question … | |
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … | |
What is Malware? Malware, is short for [B]MALicious softWARE[/B] and is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and diallers among … | |
Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is … | |
It doesn’t really matter where you live in the world, the chances are that your country has been hit by some high profile data loss scandal during the course of the last year or so. Everything from retail operations such as TJ Maxx losing the odd 40 million or so … | |
[URL="http://www.nochex.com"]Nochex[/URL] has been providing secure online payment services to small and medium businesses in the UK ever since 2001. It seems to take security seriously, as anyone dealing with your money should, with encrypted data transfers, encrypted data storage and servers at the same highly secure location as used by … | |
Back in May, I [URL="http://www.daniweb.com/blogs/entry1466.html"]broke the story[/URL] on DaniWeb in this very blog of how the online application facility for UK visas was not only insecure, but that it had potentially been so for years. The company concerned, VFS Global, which operated the visa online application form filing service on … | |
According to John Wolfe, Director of Internet Enforcement with the [URL="http://www.bsa.org"]Business Software Alliance[/URL] online auction sites have sold £4 million ($8 million) worth pirated software in just six months. The BSA has managed to prevent 36,000 illegal products from getting sold in the same period, but it does look like … | |
Finjan Inc has published its latest Web Security Trends [URL="http://finjan.com/content.aspx?id=827"]report[/URL] which contains everything you would expect, plus something you probably would not: your widgets are out to get you. Widgets, or desktop gadgets if you prefer, are exposing users to a whole host of not so delightful security exploits. Finjan's … | |
A new forensic computer from a UK based company promises to make the task of gathering evidence at the scene of a crime much easier. The dual booting Windows XP and Suse Linux [URL="http://www.dataduplication.co.uk/details/trecorder.html"]TreCorder portable forensic lab [/URL] is built into a rugged portable chassis and can simultaneously copy up … | |
Forty three British MPs have backed a House of Commons motion calling for the [URL="http://www.duchyofcornwall.org/"]Duchy of Cornwall[/URL] estate, owned by Prince Charles, to make its accounts more transparent and the finances of the Prince of Wales clearer. Which is just what might happen following the disclosure that a laptop belonging … | |
[URL="http://www.hitachi.com"]Hitachi Global Storage Technologies[/URL] has announced the world’s highest-capacity, highest-performing notebook hard drive and it will feature in Dell and Alienware systems. The 2.5”, 200Gb, 7200rpm, Travelstar 7K200 brings twice the capacity of its predecessor as well as a 22 percent performance hike. Using Hitachi’s third-generation perpendicular magnetic recording technology, … | |
[FONT="]It seems that everyone and their uncle are doing a Linux deal at the moment, and the latest to hop into the same commercial bed are IBM and Red Hat. Today the companies have announced an initiative to encourage the dramatic growth of Red Hat Enterprise Linux on IBM System … | |
According to new research from [URL="http://www.centennial-software.com"]Centennial Software[/URL] removable devices are the single biggest threat to company data so far in 2007, yet four out of five businesses are failing to defend themselves. The research resulted from a survey undertaken at this year's Infosecurity Europe, and discovered that just 16 percent … | |
I have been a supporter of RAID for the longest time; after all it would be crazy not to like something that brings efficiency and protection to the data storage process. RAID has certainly provided both, but that was then and this is now, and it is time for RAID … | |
Gartner has estimated that phishing attacks cost the US something in the region of $2.8 billion last year, a problem that is growing fast as proved by the statistic showing the average individual loss per attack has risen from $256 in 2005 to a staggering $1244 in 2006. Banks are … | |
According to Oxford, UK based database security specialists [URL="http://www.secerno.com/"]Secerno [/URL]databases are open to attack from growing insider threats that give employees carte blanche to access confidential data. Naturally, the company has a product to plug, a database assurance platform called Secerno.SQL, but to be honest I am more interested in … | |
You cannot fault the Japanese arm of Mc Donald’s for moving with the times and giving away Flash MP3 players as prizes in a competition to customers who bought large Coca-Cola drinks. But, to be honest, I would rather have had the usual tacky plastic movie tie-in toy because at … | |
I’ve just returned from the [URL="http://www.symantec.com"]Symantec [/URL]Threat Response Center in Dublin, Ireland where a select handful of European security software reviewers witnessed the first public demonstration of Norton Confidential: the Symantec response to what it refers to as the CrimeWare explosion. Symantec acquired anti-phishing specialist [URL="http://www.wholesecurity.com"]WholeSecurity [/URL]towards the end of … | |
The news that Jeffrey Toback, a representative in the Nassau County Legislature, has filed a 16 page complaint alleging Google profits from child pornography has ignited discussion of censorship, responsibility and technology. Yet I can’t help thinking that everyone is missing the real point: why are allegations covered by 10 … | |
Sony BMG, a company that makes a variety of consumer electronics such as the Walkman, CD / DVD drives and burners, has released a product called XCP (eXtended Copy Protection) that prevents copying musical materials from the media onto the computer. According to investigators, XCP uses rootkit technology to run … | |
Recently, I have wonder how to execute machine code instruction from memory in C/C++. I am aware of data execution protection. Anyway, I have this piece of code: [code=cplusplus] int main() { // allocate 2 bytes for storing machine code char* mc_add = (char*)malloc(sizeof(char)*2); int reg_eax; // for storing register … | |
StartupList report, 1/25/2009, 6:34:42 AM StartupList version: 1.52.2 Started from : C:\Program Files\Trend Micro\HijackThis\HijackThis.EXE Detected: Windows Vista SP1 (WinNT 6.00.1905) Detected: Internet Explorer v7.00 (7.00.6001.18000) * Using default options ================================================== Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Windows Defender\MSASCui.exe C:\Windows\WindowsMobile\wmdc.exe C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe C:\Program Files\Trend Micro\Internet Security … | |
Hi, was wondering fi anyone could help i'm having problems with what i think is a browser hijacker, as currently there are 7 versions of mshta.exe in my processes which really shouldn't be there. Here is the main DDS log and in the attached .zip are the other one and … | |
hi, i have a dell laptop model #PP22L. i know i have a virus because i keep getting popups that tell me im infected and they want me to purchase their software. i ran a hijackthis report and the following info came up. before the scan ran these 2 boxes … | |
Hello, my friends. I have a small problem. When I start windows as soon as it boots up, either firefox or IE starts directing me to a christian radio station. I have uninstalled both browsers and still having problems. Thanx in advance, guys!! Here is my Hijackthis log: Logfile of … | |
Can somebody help me out, I am kind of worried about some viruses. My laptop restarted last night and when i came back a windows live page came up and said I might have some malware on my computer so I ran a scan with malewarebytes but no hits Logfile … | |
Had a problem during the week where webpages were being redirected. None of my tools would run (Spybot Search & Destroy, HijackThis etc) any website I tried to visit for updates to AV also failed. I checked Hosts file and nothing strange there. I finally changed the Spybot exe to … | |
Everyonce in awhile I get this pop up message saying "Server Busy" , with a "retry" and a "switch to" option. Now it doesn't happen often but the results can be horrible. I run ableton live and have had this error completly ruin a live set I was doing. It … | |
Hi, I'm using Windows XP. I'm using Firefox now because I am no longer able to use Internet Explorer. Adobe Flash stopped working, and I can't download it through IE because the ActiveX bar never appears anymore. I'm unable to download anything on IE. (I have downloaded and reinstalled the … | |
hello... can anyone help me clean my computer of a nasty onclick.cn bug that is affecting both IE and firefox? here is my HJT log, and thank you again for being so helpful. you guys have helped many people online and I really appreciate it Logfile of Trend Micro HijackThis … | |
got a string of nasties a couple days ago, and just finished dealing with them ( almost ) my pc still boots up a bit slow, and every time i search something on google, the whole first page is total, offtopic sites. including Travelskoot, and strong-as-steel, no matter what the … | |
Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 8:48:26 PM, on 06/30/2009 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\WLTRYSVC.EXE C:\WINDOWS\System32\bcmwltry.exe C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe C:\Program Files\Alwil Software\Avast4\ashServ.exe C:\WINDOWS\system32\LEXBCES.EXE C:\WINDOWS\system32\LEXPPS.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Common Files\Apple\Mobile … | |
Hi. I would really appreciate some help. At first I couldn't open my Malware bytes - so i researched it and changed the exe to bat or scr and it worked I scanned and pulled out nearly 500 infections. I downloaded spybot and haven't gotten it to function quite right … | |
Friends, mine is a Intel Pentium 4 processor with Windows XP and Fodora LINUX dual boot operating system. Default is Windows XP. Currently I am logged on as a different user " Shanky " other than Administrator and forgot the Administrator Password. The Windows XP after boot shows only Shanky … | |
I have been trying for days to get rid of this search engine redirect virus to no avail. I have run several anti-spyware programs and have had no success. I ran through the DaniWeb pre assistance request protocol and my problem remains. Essentially the problem is that when I do … | |
I am helping a friend fix her computer, she had some malware issues. I have CA Internet Suite on the computer because she doesn't believe in virus protection and I am the one who ends up dealing with the issues. The Computer is a Dell Inspiron 600m with Windows XP … | |
I recently have been getting pop ups when I start my computer up saying that I'm sending emails to addresses that I dont know, obviously I ave a virus of some sort. I have mbam, atf cleaner, I ram the mbam software, it found 5 infected and deleted them, but … | |
Hi I need help on this. My pc (xp) got infected with spymare protection 2009. Used ad-aware and malwarebytes as well as avg free edition. Seem ok now. However cannot connect to the net since. Here is my hijackthis log. anyone can help , thanks Logfile of Trend Micro HijackThis … | |
Can anyone provide guidance to resolving a BSOD? The BSOD screen prints: PAGE_FAULT_IN_NONPAGED_AREA STOP: 0x00000050 (0xAB71C9F0, 0x00000001, 0xBA6F57E5, 0x00000000) jraid.sys - address BA6F57E5 base at BA6F2000, DateStamp 49C21E82 Output of Everest System Summary --------[ EVEREST Home Edition (c) 2003-2005 Lavalys, Inc. ]------------------------------------------------------------ Version EVEREST v2.20.405 Homepage [url]http://www.lavalys.com/[/url] Report Type Report … | |
Hello guys, Well, i haven't been around lately, as you have probably noticed.... i got a new laptop a month or two back.... now it seems to be slow and acting 'funny.' I'm wondering if you guys can help me. i used Avast for my AV Software, i have ran … |
The End.