A report from Hold Security claims that one of the biggest ever online heists has been committed by a Russian crime gang. It would appear that the data theft includes, wait for it, no less than 1.2 billion (yes billion) username and passwords along with around half a billion email addresses obtained from more than 400,000 websites. In total, Hold Security says, the stolen data amounts to some 4.5 billion items. According to the [report](http://www.holdsecurity.com/news/cybervor-breach/) the gang acquired databases of stolen credentials from online dark markets which were then used to attack e-mail providers, social media, and other websites. Spam …

Member Avatar
Member Avatar
+2 forum 2

Continuing with our round up of the IT security vendor view of the year to come, here's how PandaLabs, the malware research laboratory arm of [Panda Security](http://www.pandasecurity.com/), sees 2013 stacking up in terms of threats and exploits. ![panda](/attachments/small/0/panda.jpg "align-right") Perhaps unsurprisingly, PandaLabs predicts that 2013 will be much the same as 2012 in that software vulnerabilities will take centre stage and be the main target of cyber-criminals. It is "undoubtedly the preferred method of infection for compromising systems transparently, used by both cyber-criminals and intelligence agencies in countries around the world" according to PandaLabs technical director Luis Corrons. This year …

Member Avatar
Member Avatar
+0 forum 1

(This is my first post.) As the title suggests, I want to know of any security vulnerabilities there are in Windows 98. I have just installed Windows 98 on a virtual machine, and I wanted to see if I could exploit it somehow. The reason why I want to do it with 98 is because I know that not many people use it... so I can't really make anything dangerous for more popular OS's. Please don't think I'm trying to do anything bad, because I'm not. I want to learn this stuff because it's interesting to me and I think …

Member Avatar
Member Avatar
+0 forum 1

Hi, As part of my university project i am doing a literature review that looks at the vulnerability of data contained by websites. It will contain the threats to the data and how it can be protected. Wondered if anyone can recommend any journals, websites, books or any other sources related to my subject that i could read and use? Thanks

Member Avatar
Member Avatar
+0 forum 1

A few days ago, Red Hat, Inc., [URL="https://www.redhat.com/archives/fedora-announce-list/2008-August/msg00012.html"]announced[/URL] that an intruder had broken into some of their systems and possibly compromised some important software packages. The most significant among them is OpenSSH--a secure method of connecting to a remote Linux system. Red Hat quickly took the systems offline to investigate the damage and found that one of their Fedora systems had been breached. This server is used to sign packages for distribution amongst the various mirrors and networks for download. Package signing assures the end user that the package is genuine and free of harmful code. Thus far, Red Hat …

Member Avatar
+0 forum 0

While Apple has displayed a [COLOR=Black][URL="http://www.apple.com/"]new banner[/URL][/COLOR] on its website declaring Happy New Years, "The first 30 years were just the beginning. Welcome to 2007," the [URL="http://projects.info-pull.com/moab/"]Month of Apple Bugs[/URL] has been launched, as if to scorn Apple's website banner. The Month of Apple bugs aims to reveal a new bug everyday related to Mac software. So far, 2 vulnerabilities have been revealed, a serious QuickTime flaw that is present in both Mac and Windows computers equipped with QuickTime, and could potentially allow arbitrary code execution when a user visits a booby-trapped URL using the [URL="http://www.rtsp.org/"]rtsp protocol[/URL]. The other vulnerability …

Member Avatar
+0 forum 0

A couple years ago, RedHat Linux was a completely open-source, freely-available linux solution that brought linux to the masses. Then, RedHat changed the paradigm: they wanted to transform RHL to a corporate supported linux, and enjoined with the Fedora Project for community support. But now a choice had to be made for linux users-- stay with RedHat 9, purchase RedHat Enterprise Linux, or migrate to Fedora Linux. But now, there are some new guys on the block, and one of them is CentOS -- the Community Enterprise OS. CentOS is not related to RedHat in any way -- what they …

Member Avatar
Member Avatar
+0 forum 3

The End.