1,118 Topics
|
|
Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages … |
|
New research from ISACA suggests that US consumers with 'work-supplied' computing devices intend, on average, to spend nine hours shopping for gifts on them during the forthcoming holiday season. When it comes to the Bring Your Own Device (BYOD) brigade, those who use personal mobile devices for work, that average … |
|
Security vendor Malwarebytes has reported that a new variation of an old password stealing Trojan is out in the wild, but all is not as it may seem. Notably, this particular Trojan is signed with an apparently 'genuine' digital certificate that authenticates the file. Which rather prompts the question: "say … |
|
The 'World's Greatest Anti-Malware Software' is the spurious claim being made by Malwarebiter, which just so happens to sound an awful lot like Malwarebytes which could perhaps justifiably lay claim to that accolade. Take a look at this forum and you will see that Malwarebytes is a very valuable tool … |
|
According to IT security outfit Kaspersky, which has just [published details](http://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012) of the information security landscape as it was shaped during 2012, 99% of all mobile malware threats now target Android devices. With 6300 new mobile malware samples discovered every month on average across 2012, Android has become the focus … |
|
According to new research from Kaspersky Lab, in the form of a report called [Evaluating the threat level of software vulnerabilities](http://media.kaspersky.com/documents/business/misc/Kaspersky_Lab_Report_Software_Vulnerabilities_final.pdf), 72% of Java users haven't switched to the latest, safest, version despite highly publicised vulnerabilities and resulting security exploits. ![dweb-java011](/attachments/small/0/dweb-java011.jpg "align-right") And it's not just Java, the report also … |
|
Hey guys, First of all please don't consider this an act of spam, it is not my intencion to spam! I belong to a small team that created the visualCaptcha (visualcaptcha.net), and we are looking for some reviews from web developers. We have downloads but we don't get much feedback … |
|
According to new independent research commissioned by Corero Network Security, and conducted by the Ponemon Institute, two thirds of banks in the United States have suffered a Distributed Denial of Service (DDoS) attack during the last 12 months. The 64% statistic refers to the number of IT and IT security … |
|
Continuing with our round up of the IT security vendor view of the year to come, here's how PandaLabs, the malware research laboratory arm of [Panda Security](http://www.pandasecurity.com/), sees 2013 stacking up in terms of threats and exploits. ![panda](/attachments/small/0/panda.jpg "align-right") Perhaps unsurprisingly, PandaLabs predicts that 2013 will be much the same … |
|
Good day, I have a vb.net application that navigates to a series of url's and logs in, using credentials read from an external file. After navigating to some URL's a windows security pop-up appears and takes focus. Can anyone please point me to information to populate ths pop-up with credentials … |
|
hello i just need some advice and suggestions the program(will be using vb.net & matlab) is about security software for flash drives where the user is required to say something(eg. a password) that will open or explore the device. the thing is when the flash drive is plugged to the … |
|
Network security vendor [Stonesoft](http://www.stonesoft.com/en/) predicts that the top infosec threats to watch out for in 2013 will include unseen and unknown targeted cyber-attacks, espionage and hacktivism. Jarno Limnell, director of cyber-security at Stonesoft, reckons that in 2013 the security of the digital world will become an even more pressing issue, … |
|
An in-the-wild exploit targeting a vulnerability with Java 7 has led to security experts the world over warning users to disable the Java plug-in for their browser clients at the very least, and preferably uninstall Java altogether. The CVE-2012-4681 vulnerability, comprising two flaws, along with a couple of other 'related … |
|
According to the boffins at Kaspersky Lab, users of Android devices running Gingerbread (Android 2.3.6) and Ice Cream Sandwich (Android 4.0.4) are targeted the most by cybercriminals. Gingerbread accounted for 28% of all the attempts to install malware that were successfully blocked by Kaspersky, while Ice Cream Sandwich accounted for … |
|
I have read several replies here and I am in the process of testing them now but since this is a problem I need an urgent fix for, I thought it would not hurt to ask again. We have an Apache website that is extremely simple in design. It's main … |
|
Microsoft has released YAIESA, or Yet Another Internet Explorer Security Advisory if you prefer. This time, [SA2757760](http://technet.microsoft.com/en-us/security/advisory/2757760) warns about a new zero-day out there in the wild which impacts all users of Internet Explorer 9 and earlier versions. It's the usual case of targeted attacks being spotted which could lead … |
|
The results of a new security survey, which asked some 6,000 people across Europe questions about cybercrime, would appear to suggest that nearly everyone (88% of respondents in fact) is some kind of online victim. Have things really got this bad, or is it just another case of the security … |
|
Earlier this year Jonathan Evans, the Director General of MI5 (the UK Security Service), warned that cyber attacks against UK plc were as much of a security challenge as terrorism as far as Britain was concerned. He claimed that UK businesses were being targeted at an 'astonishing' rate driven by … |
|
Gary McKinnon, an unassuming 46 year old Londoner who suffers from Asperger's syndrome and depression, is an unlikely man to be making headlines the world over once again. Indeed, across the last decade McKinnon has almost seemed to be a permanent fixture in news media feeds online and off, a … |
|
Samsung has fixed the Unstructured Supplementary Service Data (USSD) exploit that could remotely wipe data from a Galaxy S III smartphone, but that doesn't mean the USSD threat is over: far from it in fact. According to some security researchers, 400 million Android device users are at risk from having … |
|
Guys, I just want to know whether is there any way to give a security to the webpages hosted in server. For example, I have hosted jsp application using tomcat. I want to prevent someone from copying those files from tomcat in my computer(Maybe from C Drive). Anyhelp will be … |
|
The 'Murder Ball' competition is now underway at the London 2012 Summer Paralympics, also known as wheelchair rugby to some. However, you won't find Olympic athletes taking part in the warbiking event that has also been happening in London recently: warbiking is very much a sport for nerds. ![warbike](/attachments/small/0/warbike.jpg "align-right") … |
|
If audit log is turn off on the windows server, can i use a software to generate & view the log files. If yes please suggest the tool. Regards, |
|
I need some project ideas on cryptography/information system securoty for a simple and small project....... |
|
Hello friends, I'm a Computer Security student. I need some opinions for my Final Year Project idea. Im planning to create an application on VB.NET which protects a network from unknown users like hackers by filtering their MAC addresses/Hostname/IP. The application will work similar to the software inside the modem/router … |
|
Hello Everyone, I need your help please, using htaccess, I like to know how to deny access to an index.php file from all visitors except me. I have tried the following; <files index.php> order allow,deny deny from all </files> That works denying all access to that file. I would like … |
|
I have a Flight Log for a small company. I have been able to figure out most of the needs but 2, using Adobe Acrobat 9 and Javascript. 1. I have a passenger manifest that needs a count...I am having a problem with figuring out the code for the counter … |
|
If the news that the Yahoo! Contributor Network user-generated content site has been breached and more than 450,000 usernames and passwords compromised as a result wasn't bad enough, look behind yesterdays headlines and the situation is revealed to be much, much worse. If you were one of those folk who … |
|
One of the Internet's biggest online dating sites, eHarmony, has confirmed that security has been breached and member passwords compromised. eHarmony spokesperson Becky Teraoka says that "a small fraction of our user base has been affected" although I am led to understand that the 'small fraction' in question is actually … |
|
[ATTACH=RIGHT]22280[/ATTACH]Mobile phone security threats used to be mocked by everyone outside of vendors with mobile antivirus software to sell. That has changed, and how. The online media headlines have been full to bursting with reports that 'mobile malware' had grown by a staggering 273 percent in the first half of … |
The End.