| Saturday July 26th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

Redbox (those $1 DVD machines) found with credit card skimmers installed

Redbox (those $1 DVD machines) found with credit card skimmers installed

Looks like people in the South-west United States are getting their credit cards skimmed at their local Redbox. In case you forgot what a skimmer is, catch up on our past post about it.... To Our Valued Customers: A few days ago redbox detected and removed an illegal credit card skimming device at one of our 7,400 locations. At the [...]

HOWTO: Change the mood of any user on Facebook who has the Moods application installed

This "hack" has already been patched but the method is still useful to any good script kiddie. In fact, it's barely a "hack." You are only modifying the information being sent to a 3rd party that is used within a Facebook application. LOL. Personally, I don't want to be responsible for putting someone in a bad mood.

UPDATE: With Vista breached, Linux unbeaten in hacking contest

UPDATE: With Vista breached, Linux unbeaten in hacking contest

Does anybody know what distribution was used? Something like RedHat or Fedora is pretty significantly hardened right "out of the box", where there are other distros that aren't as locked-down. The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on the last day of the contest; but it was Linux, running on a Sony [...]

Macbook Air Hacked in 2 mintues

Macbook Air Hacked in 2 mintues

San Francisco - It may be the quickest $10,000 Charlie Miller ever earned. He took the first of three laptop computers -- and a $10,000 cash prize -- Thursday after breaking into a MacBook Air at the CanSecWest security conference's PWN 2 OWN hacking contest. Show organizers offered a Sony Vaio, Fujitsu U810, and the MacBook as prizes, [...]

VLC Player Vulnerable to Remote Hijack

VLC Player Vulnerable to Remote Hijack

VLC is a popular media player among BitTorrent users. Not just for the fact that it is free, also because it includes a huge number of the video codecs, so it can play virtually every video file available.Unfortunately, the latest versions of VLC have a security flaw according to a report from Luigi Auriemma. The vulnerability can be exploited to [...]

Bill criminalizing WiFi leeching shot down, and rightly so

Bill criminalizing WiFi leeching shot down, and rightly so

If you use someone else's WiFi signal without permission, you're a thief. That's the conclusion of a bill introduced into the Maryland General Assembly last week. Sponsored by Delegate LeRoy E. Myers, Jr., the legislation would criminalize the unauthorized use of a wireless access point in the state; it has since received an "unfavorable report" [...]

Automatically Lock Your Computer When You Walk Away with Blue Lock

Automatically Lock Your Computer When You Walk Away with Blue Lock

Free, open source application Blue Lock monitors the proximity of your Bluetooth phone or device and automatically locks your computer whenever it's out of range (e.g., you've walked away from your computer). The usefulness will depend on the strength of your Bluetooth devices, since it's not really going to do its job if you've got a strong [...]

Kurt Cobain: Ghost or ID Theft Victim?

Kurt Cobain: Ghost or ID Theft Victim?

Legendary rock star is still buying houses long after his tragic death, according to widow Courtney Love MARCH 14, 2008 | Con men bought a $3.2 million mansion in New Jersey last year using the Social Security number of iconic Nirvana frontman Kurt Cobain, according to the late rocker's wife, Courtney Love. Love told a London newspaper [...]

Customs Proof Your Laptop

Customs Proof Your Laptop

If you've got plans to travel outside of the country in the near future and you plan on taking your laptop, the Iconoclast Blog details how to secure and customs-proof your laptop so that your sensitive information is protected. The guide suggests data encryption methods that will keep your sensitive data private, highlighting applications like [...]

What is a Firewall and Why Do You Need One?

What is a Firewall and Why Do You Need One?

A strong firewall is one of the best defenses against malicious software attacks on your system. Newcomers to computer security who aren't running a firewall should check out Yahoo's Tech Security Guide on the matter. The key point is that anti-virus alone is not enough to protect your computer: A firewall plugs the security holes ... and blocks [...]

The Great ICMP Debate: Disable ICMP echoes or leave them on?

The Great ICMP Debate: Disable ICMP echoes or leave them on?

This one should be pretty self explanatory. If you have any sort of position regarding network security, do you allow ping requests from external IPs, or do you block them at the firewall/router level, and why? My own personal choice, for home, is to leave them on. On for servers I use a firewall rule to deny any > 128 bytes. Also, a bot [...]

Windows NT UNICODE Vulnerability Analysis

Windows NT UNICODE Vulnerability Analysis

It can be argued that the main purpose for computer systems is fast and reliable communication from one system to another. How is that accomplished? What allows a computer running an English operating system to communicate with one running a Russian operating system? Both have different human readable alphabets. Both have different character [...]

HOWTO: Block Bots and Cheaters From Your Website

HOWTO: Block Bots and Cheaters From Your Website

So there was an online poll set up on a website I help admin and noticed one contestant's votes going up by 300 votes overnight. In comparison, other contestants would go up 100 votes in a whole day. This person was obviously cheating by using proxys and/or intercepting/modifying the HTTP headers, as the IP addresses in the IP log were all [...]

Stupid .htaccess Tricks

Stupid .htaccess Tricks

Apache server software provides distributed (i.e., directory-level) configuration via Hypertext Access files. These .htaccess files enable the localized fine-tuning of Apache’s universal system-configuration directives, which are defined in Apache’s main configuration file. The localized .htaccess directives must operate from within [...]

Encryption Legislation Goes Overboard

Encryption Legislation Goes Overboard

Bills pending in the Michigan and Washington state legislatures would mandate that personal information stored in business computers be “encrypted.” Legislatures are unwise to engage in such micro-management. Pending Michigan Senate Bill (SB) 1022 would forbid a business from storing personally identifiable information in a database [...]

Researchers: Disk Encryption Not Secure

A team from Princeton University has developed ways to break disk encryption, including Bitlocker, Truecrypt, Apple encryption, and Linux encryption, if the computer is in sleep mode or sitting at a password prompt, or even if it's just been turned off. (more…)

Disk encryption in Fedora: Past, present, and future

Disk encryption in Fedora: Past, present, and future

These days, data is mobile. Every day, sensitive corporate data leaves a company’s headquarters on a flash drive or an employee’s laptop. Regardless of where it is going, mobile data can be an I.T. department’s worst nightmare. In fact, the 2006 “CSI/FBI Computer Crime and Security Survey,” a joint effort by [...]

Botnet Hunters Reveal New Spin on Old Tricks

Botnet Hunters Reveal New Spin on Old Tricks

Damballa researchers share some techniques for getting a better picture of botnets -- and targeted attacks By Kelly Jackson Higgins Senior Editor, Dark Reading Is that malware found on your client machine the sign of a targeted attack or a routine bot-herding run? How do you know for sure? Botnet hunters from Damballa are using some [...]

Local root exploit in kernels 2.6.17 to 2.6.24.1

There is a new local root exploit found in linux kernels 2.6.17 to 2.6.24.1. Here's a proof-of-concept, which basically works as a "passwordless su". I have tested the exploit on a few systems I manage, and it just plain works on a number of them. The distros I have around that are vulnerable are: Fedora 8 CentOS 5/5.1 (and therefore [...]

Leopard 10.5.2 Update is now live

Leopard 10.5.2 Update is now live

Leopard finally gets its second patch, and boy does it fix a lot of stuff. The first patch hit back in November, with test builds of the second making it out a month later. Here's a list of the major things the 10.5.2 patch fixes (including menubar transparency and Stacks). • Airport connection reliability and stability • Back to [...]

 Page 12 of 14  « First  ... « 10  11  12  13  14 »