Security
|
Written by Daniel
|
Thursday, 24 June 2010 18:09 |
From Daily Tech
While they may never be able to truly defeat piracy and drive it from the lurking depths of the internet, copyright protection attack-dog organizations like the RIAA and MPAA have long dreamed of the day when they would no longer have to pay for their own copyright enforcement. Now that dream is on the verge of coming true, thanks to the Obama administration.
|
Read more...
|
|
Security
|
Written by Daniel
|
Tuesday, 22 June 2010 17:47 |
From Dark Reading
Black Hat USA researcher will demonstrate how to find clues to help ID actual attackers, plans to release free fingerprinting tool.
Malware writers actually leave behind a telling trail of clues that can help identify their native tongue, their geographic location, their ties to other attacks -- and, in some cases, lead law enforcement to their true identities. A researcher at Black Hat USA next month plans to give away a homemade tool that helps organizations glean this type of intelligence about the actual attacker behind the malware.
|
Read more...
|
Security
|
Written by Daniel
|
Friday, 18 June 2010 17:59 |
From Computer World
Action likely to push company closer to being shuttered
Eight music publishers have sued LimeWire LLC of massive copyright infringement, even as a federal court in New York is considering a request by the Recording Industry Association of America (RIAA) to shut the file-sharing software maker down over a similar complaint.
|
Read more...
|
Security
|
Written by Daniel
|
Wednesday, 16 June 2010 17:24 |
From DarkReading
Security experts agree that there's something wrong with the software development process, but there are differing opinions on how to solve the problem
It's another day in the life of a security pro -- or a hacker. Much of your time is spent searching applications for that one weak point, the one that will lead to the breach of sensitive data. And nearly every day, somebody finds one. Or more.
With all of the security know how offered today – and all of the advanced tools offered to applications developers – why is software still riddled with security vulnerabilities? The answers are many, and they don't always agree. And solutions to the problem? Those are even more diverse.
|
Read more...
|
Security
|
Written by Daniel
|
Monday, 14 June 2010 16:35 |
From Dark reading
Researchers who exposed hole say they "did the right thing," AT&T says they acted "maliciously" The FBI has launched an investigation into the exposure of email addresses of thousands of iPad customers on an AT&T website this week.
Researchers with Goatse Security who this week revealed the weakness in the AT&T site -- basically a business-logic flaw in AT&T's app that was left available and accessible to the public -- were able to get the email addresses of more than 100,000 iPad customers, including some high-profile people.
|
Read more...
|
Security
|
Written by Gizmo
|
Friday, 11 June 2010 19:43 |
IDG News Service - A glitch in AT&T's Web site has exposed the e-mail addresses of more than 100,000 iPad buyers.
|
Read more...
|
Security
|
Written by Daniel
|
Wednesday, 09 June 2010 18:08 |
From Information Week
Ten advisories detailing 34 vulnerabilities -- 6 deemed "critical"-- round out the June security patch cycle.
As part of its "Patch Tuesday" cycle for issuing information about vulnerabilities in its products on the second Tuesday of each month, Microsoft Tuesday released 10 bulletins, covering 34 vulnerabilities. Six of those vulnerabilities rate as "critical," and affect Microsoft Windows, Data Analyzer ActiveX, Internet Explorer 8 Developer Tools and Internet Explorer.
|
Read more...
|
Security
|
Written by Daniel
|
Tuesday, 08 June 2010 16:35 |
From Dark Reading
More than twice the number of malware and spyware hitting BlackBerry, Windows Mobile, and Android phones than six months ago
The number of malware and spyware programs found on smartphones has more than doubled in the past six months -- and some types of malware are more prevalent on certain smartphone platforms than others.
|
Read more...
|
Security
|
Written by Danrok
|
Monday, 07 June 2010 17:46 |
From the BBC:
Adobe has acknowledged a "critical" security flaw in its Reader, Acrobat and Flash Player software.
|
Read more...
|
Security
|
Written by Daniel
|
Monday, 07 June 2010 16:15 |
From Information Week
In what it describes as a move toward greater transparency, Google has provided details about its security practices in a newly published paper. In an effort to communicate its commitment to the security of its online services, Google on Friday published a paper that delves into its corporate security strategy.
|
Read more...
|
|
|
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
|
Page 7 of 28 |