| Saturday November 1st 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

Encrypted Laptop Poses Legal Dilemma

Encrypted Laptop Poses Legal Dilemma

BURLINGTON, Vt. (AP) — When Sebastien Boucher stopped at the U.S.-Canadian border, agents who inspected his laptop said they found files containing child pornography.But when they tried to examine the images after his arrest, authorities were stymied by a password-protected encryption program. Now Boucher is caught in a cyber-age [...]

HOWTO: Defeat Sealed PDFs, A DRM Nightmare

HOWTO: Defeat Sealed PDFs, A DRM Nightmare

Have you ever heard of a "sealed" PDF? I don't mean password-protected or branded with your name (as some eBook sellers do). This is a different beast. Let me introduce a company called SealedMedia. Their business is protecting electronic documents (PDFs), a form of Digital Rights Management (DRM) which has always been a topic of ongoing debate. [...]

TrueCrypt 5.0 now supports OSX

TrueCrypt 5.0 now supports OSX

Since so many Mac users are also child porn enthusiasts, I thought you might like to know that the newest version of TrueCrypt came out last night and they support OS X now. Now my trendy Mac friends can stop having to mess around with their USB keychain, mirroring their passwords and bill pay confirmations from a Mac sparseimage to a TrueCrypt [...]

Diebold voting machine key copied from pic on Diebold site

Diebold voting machine key copied from pic on Diebold site

In another stunning blow to the security and integrity of Diebold's electronic voting machines, someone has made a copy of the key which opens ALL Diebold e-voting machines from a picture on the company's own website. The working keys were confirmed by Princeton scientists, the same people who discovered that a simple virus hack on the Diebold [...]

What can be done after ARP poisoning?

What can be done after ARP poisoning?

To protect yourself from security threats, you have to at least know what security threats that happens and how it could harmful to you. In what network environment, you are susceptible to hacker’s attack, spoof, phishers. You have to understand what attacks they can performs, what tools they have used and experience the same tools and [...]

No-Fly list circumvented by using middle name

No-Fly list circumvented by using middle name

A government program set up to remove innocent people from terrorism no-fly and watch lists has been ineffective and riddled with problems, travelers and congressional leaders say. The Department of Homeland Security's Traveler Redress Inquiry Program, or TRIP, was started almost a year ago to clear people routinely subjected to extra [...]

500,000 private Myspace pictures leaked and available for download

500,000 private Myspace pictures leaked and available for download

Sorry for the typical and tredy "myspace pic" above. This is an article from Wired Magazine. It might be the largest "security breach" in awhile but what on earth would anyone do with 17gb of random Myspace teenagers? A 17-gigabyte file purporting to contain more than half a million images lifted from private MySpace profiles has shown up on [...]

New Hampshire Primary: Sham Chain of Custody

This is how the Government secures your ballots. WOW. This is a must see.

Checkout BackTrack 3 Teaser

Checkout BackTrack 3 Teaser

The Backtrack 3 beta is out and here is a video of it's many features. In case you've been living under a rock, every package, kernel configuration, and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment. Video [...]

Taiwan Says China Accounts for Most Cyber Attacks

Taiwan Says China Accounts for Most Cyber Attacks

Neighboring countries battle it out with secret cyber armies of hackers, report says JANUARY 17, 2008 | Taiwan officials say that 99 percent of cyber attacks on their government computers came from IP addresses in China, according to a published report in The Asahi Shimbun. For over four years, personal computers of Taiwan's top government [...]

New trojan out for the iPhone

New trojan out for the iPhone

A significant cottage industry has sprung up among experts debating whether Apple’s iPhone should be sanctioned by IT departments for use in the enterprise. Last week, various sites and publications — including internetnews.com — reported that the first hack has arrived. The US Computer Emergency Response Team (US-CERT) [...]

Did Hackers Win It for Hillary?

Did Hackers Win It for Hillary?

As rival calls for recount in New Hampshire, TV documentary claims voting machines were easily hackable< JANUARY 14, 2008 | The voting may be over in New Hampshire, but the debating isn't, as pollsters and rivals question the validity of Hillary Clinton's stunning upset victory last week. According to reports, some of those who were [...]

HOWTO: Access the Internet When Web Browsers are Disabled

HOWTO: Access the Internet When Web Browsers are Disabled

Ever been on PC where Internet Explorer was blocked? One solution would be to use a portable version of Firefox on a USB drive, or you can access a hidden browser in Microsoft HTML Help program if removable media is not an option. This was tested on Windows XP SP2 with Internet Explorer 6. (more…)

Urban WiFi Routers at Risk

Urban WiFi Routers at Risk

Indiana University researchers say densely populated wireless routers could be the next method for spreading pharming, script injection, and bot infections By Kelly Jackson Higgins Senior Editor, Dark Reading Your crazy next-door neighbor could also be your biggest WiFi security risk: If his wireless router gets infected, it could spread [...]

Top 10 Secure Coding Practices

Top 10 Secure Coding Practices

I like this photograph because it illustrates how the easiest way to break system security is often to circumvent it rather than defeat it (as is the case with most software vulnerabilities related to insecure coding practices). Top 10 Secure Coding Practices: (more…)

HOWTO: Protect chmod 777 folders

HOWTO: Protect chmod 777 folders

Sometimes linux hosting users need to change the permissions on a folder to use upload scripts or other applications that need this permissions. With chmod 777 their folder gain the rights: writing / reading and execute for everyone. Malicious hackers like these kind of folders. How can you protect that folders? You can turn PHP off on that [...]

Make Random and Pronouncable Passwords with PWGen

Make Random and Pronouncable Passwords with PWGen

Windows and Linux command-line utility PWGen generates random, meaningless passwords but uses letter and number combinations that can be pronounced and memorized. Simply typing "pwgen" and hitting Enter will shoot back a screen full of passwords to choose from, helping to prevent shoulder-surfing sneaks, but you can easily hone down and customize [...]

Inside the Chinese malware economy

Inside the Chinese malware economy

German and Chinese researchers have just released a study that explores the world of Chinese commercial cybercrime. The researchers set up virtual PCs running Internet Explorer, then visited nearly 15,000 Chinese websites, deliberately infecting their virtual systems with whatever crapware happened to be running on the system. Then they carefully [...]

Attackers target unpatched QuickTime flaw that affects Windows & Macs

Attackers target unpatched QuickTime flaw that affects Windows & Macs

The vulnerability, called the Apple QuickTime RTSP Response Header Stack-Based Buffer Overflow Vulnerability, was first disclosed on Nov. 23rd and still remains unpatched. The vulnerability can be exploited through Internet Explorer, Firefox, Opera, and Safari and effects both Windows and Mac users. First observed on Saturday, the attacks [...]

10 Useful Websites to Stop Others From Snooping on You

10 Useful Websites to Stop Others From Snooping on You

People probably don't realize, just how often and in how many ways that total strangers are snooping in their lives. Whether the snooping means are video cameras, cell phones or through the Internet there are thousands of businesses, people and governments all up our personal business and lives. Every time a person fills out a contest [...]

 Page 13 of 14  « First  ... « 10  11  12  13  14 »