Computer Security
Security
|
Written by Daniel
|
Wednesday, 05 August 2009 11:24 |
Security industry should not be waiting around for government to lead, speakers say
Aug 03, 2009 | 02:55 PM By Tim Wilson DarkReading
LAS VEGAS -- BLACK HAT USA 2009 -- Cyber czar, cyber schmar. If you're waiting for the government to take the lead in the cybersecurity industry, then you're going to have a long wait.
That was the consensus of cybersecurity experts here this week, including some former government officials and others who are still in prominent government positions. Their message: The security industry should get on with its work, regardless of what Congress and President Obama might (or might not) do. [Comments...] |
|
Security
|
Written by Daniel
|
Tuesday, 04 August 2009 10:47 |
I don't expect PayPal to be perfect, but I think they own their customers an explanation when something goes wrong.
Michael Horowitz, Computerworld Aug 4, 2009 8:26 am I went to login at Paypal.com around 1:30PM ET yesterday and the submission of my email address and password resulted in a "500 Internal Server Error".
This was with Firefox 3.51, so then I tried Internet Explorer 7 and purposely supplied the wrong password. Same thing. Then I tried the wrong email address to see if the problem was just my account -- it wasn't. [Comments..] |
Security
|
Written by Daniel
|
Friday, 31 July 2009 10:23 |
Microsoft is the victim of more leaks Jason Mick (Blog) - July 29, 2009 12:30 PM DailyTech While software leaks are inevitable, Windows 7 has been particularly leaky during the course of its development. Hot on the heels of the leaks of near-RTM builds onto the internet, a new Windows 7 package has leaked -- an active copy of Ultimate edition. |
Read more...
|
Security
|
Written by Danrok
|
Friday, 31 July 2009 08:02 |
From the BBC:
Mobile handsets including iPhones and those using Windows Mobile or Google's Android operating system are vulnerable to text-based attacks, say experts.
Software code that arrives in a text message can hijack the phones,
said Charlie Miller and Collin Mulliner at the Black Hat conference in
Las Vegas.
|
Read more...
|
Security
|
Written by Gizmo
|
Thursday, 30 July 2009 12:37 |
By: Roy Mark
Eweek
A study by mobile security company SMobile Systems claims smartphones running the Symbian operating system are breeding grounds for spyware, viruses, worms and Trojans. SMobile says most users of the infected Symbian smartphones are unaware of the infections.
|
Read more...
|
Security
|
Written by Daniel
|
Thursday, 30 July 2009 10:54 |
Apple says terrorists could use iPhones to attack cell phone towers
Jason Mick (Blog) - July 29, 2009 4:00 PM
Apple has tried everything to stop iPhone unlockers. Bricking iPhones didn't work -- it just generated more headaches and bad PR. Apple's internal protection technology turned out to be just as weak and poorly implemented as its consumer security on the iPhone -- the hackers quickly overcame the latest protections Apple threw at them. Now with its shiny new iPhone 3G S becoming yet the latest handset to be freed, Apple has turned to none other than the U.S. government for help.
The company has submit a report to the U.S. Copyright Office suggesting that iPhone unlocking be outlawed (and jailbreaking from the AT&T network, essentially as well as it would be impossible without unlocking) as Apple claims it threatens cell phone towers across America. Apple claims that unlocking the iPhone provides easy access to the iPhone’s BBP — the “baseband processor” software, which enables a connection to cell phone towers. [DailyTech....] [Comments...]
|
Security
|
Written by Daniel
|
Tuesday, 28 July 2009 10:40 |
Two out-of-band security bulletins will be issued tomorrow to fix a critical flaw in Internet Explorer and a related issue in Visual Studio. Microsoft is withholding details until the patches are released.
By Thomas Claburn
InformationWeek
July 27, 2009 04:50 PM
Microsoft (NSDQ: MSFT) late Friday said it would issue two security bulletins on Tuesday, July 28, outside of its regular monthly patch cycle. The company typically releases "out-of-band" bulletins to address vulnerabilities that demand immediate attention.
In a statement, Mike Reavey, director of the Microsoft Security Response Center, provided few particulars other than saying the two bulletins -- one affecting Visual Studio and one affecting Internet Explorer -- will address a single, overall issue. "While we can't go into specifics about the issue prior to release, we can say that the Visual Studio bulletin will address an issue that can affect certain types of applications," he said. "The Internet Explorer bulletin will provide defense-in-depth changes to Internet Explorer to help provide additional protections for the issues addressed by the Visual Studio bulletin." [Comments...]
|
Security
|
Written by Daniel
|
Monday, 27 July 2009 11:43 |
Apple says its iPhone 3G S is "ready for business", however one leading hacker calls it "useless" for business users, thanks to its woefully poor encryption and security.
Jason Mick (Blog) - July 24, 2009 1:42 PM
He says the phones pose a serious threat to companies adopting them. Still, some companies say it's worth the risk. (Source: The iPhone Blog)
The iPhone yet again experiencing criticism over poor security
Jonathan Zdziarski, an iPhone developer and a hacker who teaches forensics courses on recovering data from iPhones, hasn't been very impressed with the iPhone's security -- or lack thereof. Mr. Zdziarski has indicated that iPhone OS v3.0 is a bit better when it comes to security, but he says with only a few pieces of readily available freeware you can easily crack it in under two minutes. That news must be concerning for the corporations and government agencies that support the hundreds of thousands of business iPhones Apple says it has sold. [Daily Tech....] [Comments....]
|
Read more...
|
Security
|
Written by Daniel
|
Wednesday, 22 July 2009 12:09 |
At Black Hat USA, WhiteHat Security researchers to highlight more and bigger-dollar hacks that don't use malware or security bugs
Jul 21, 2009 | 05:52 PM
By Kelly Jackson Higgins
DarkReading
There was the iPod repairman online who allegedly pulled in a half-million dollars defrauding Apple and its iPod customers. There was also the hacking-for-hire scheme that made the bad guys a tidy nine-figure profit.
While the security industry spends most of its energy and resources on malware- and vulnerability-based methods of attack, a lesser-known and more lucrative world of hacking is going on right under our noses that rarely comes to light unless it makes the general news. These are the low-tech and no-tech attacks and scams that don't require malware or scanners, and they are rarely reported because they don't typically involve reporting stolen credit cards or other personal information. "This is the easier, higher dollar [attacks]," says Jeremiah Grossman, CTO of WhiteHat Security. "These almost never get reported...they are basic fraud losses that everyone keeps quiet about." [Comments...]
|
Security
|
Written by Danrok
|
Tuesday, 21 July 2009 07:35 |
From the BBC:
An update for Blackberry users in the United Arab Emirates could allow unauthorised access to private information and e-mails.
The update was prompted by a text from UAE telecoms firm Etisalat, suggesting it would improve performance.
|
Read more...
|
|
|
<< Start < Prev 21 22 23 24 25 26 27 28 Next > End >>
|
Page 21 of 28 |
|
|