| Friday August 1st 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

LAlarm Turns Your Laptop’s USB Port into an Alarm

LAlarm Turns Your Laptop’s USB Port into an Alarm

LAlarm uses the USB port or power port of your laptop as a sensor to detect when your laptop has been disturbed. While a piece of software is no substitute for keeping your laptop directly in your hands at all times, when it isn't immediately practical or convenient you can use LAlarm to give you a heads up if your laptop is on the [...]

Linux botnet discovery worry

Linux botnet discovery worry

Bad guys have created a botnet of Linux Web servers. In a way, that's even more frightening than regular botnets of compromised Windows PCs. Bloggers ask if this is the end for Linux's claim to be more secure than Windows; or is it just a load of old hokum? Your humble blogwatcher selected these bloggy morsels for your enjoyment. Not to mention [...]

SQL Injection used to steal 130,000,000 credit card numbers at Heartland

SQL Injection used to steal 130,000,000 credit card numbers at Heartland

Officials say it is the biggest case of identity theft in American history. They say Albert Gonzalez, 28, and two un-named Russian co-conspirators hacked into the payment systems of retailers, including the 7-Eleven chain. Prosecutors say they aimed to sell the data on. If convicted, Mr Gonzalez faces up to 20 years in jail for wire fraud [...]

Two convicted for refusal to decrypt data

Two convicted for refusal to decrypt data

Two people have been successfully prosecuted for refusing to provide authorities with their encryption keys, resulting in landmark convictions that may have carried jail sentences of up to five years. The government said today it does not know their fate. The power to force people to unscramble their data was granted to authorities in [...]

Black Hat 2009: Parking meter hacking

Black Hat 2009: Parking meter hacking

For day two of Black Hat, we sat in on on Joe Grand, Jacob Appelbaum, and Chris Tarnovsky's study of the electronic parking meter industry. They decided to study parking meters because they are available everywhere, but rarely considered from a security perspective. They focused on the San Francisco’s MTA implementation of electronic smart [...]

How To Hijack “Every iPhone In The World”

How To Hijack “Every iPhone In The World”

If you receive a text message on your iPhone any time after Thursday afternoon containing only a single square character, Charlie Miller would suggest you turn the device off. Quickly. That small cipher will likely be your only warning that someone has taken advantage of a bug that Miller and his fellow cybersecurity researcher Collin Mulliner [...]

Stopgap Fix for Critical Firefox 3.5 Security Hole

Stopgap Fix for Critical Firefox 3.5 Security Hole

Instructions showing hackers how to exploit an unpatched, critical security hole in Mozilla's new Firefox 3.5 Web browser have been posted online. So, until Mozilla can ship an update to quash this bug, LandoftheFreeish.com is posting instructions to help readers protect themselves from this vulnerability. The security hole has to do with a [...]

“Anti-Sec” group hacks ImageShack and demands changes in security research

“Anti-Sec” group hacks ImageShack and demands changes in security research

ImageShack, one of the Web's largest image hosts, was attacked over the weekend by a group called "Anti-Sec," which is demanding changes to the security industry's practice of full disclosure of vulnerabilities. According to a report, the group replaced many of ImageShack's hosted images with its own manifesto, which states, in part: "The [...]

Prevent brute force attacks on SSH servers with DenyHosts

Prevent brute force attacks on SSH servers with DenyHosts

DenyHosts is a Python script that analyzes the sshd server log messages to determine what hosts are attempting to hack into your system. It also determines what user accounts are being targeted. It keeps track of the frequency of attempts from each host. DenyHosts is designed for the use by Linux system administrators, the script can be useful to [...]

HOWTO: Incorporate escrow of your keys and passwords into your estate plan

HOWTO: Incorporate escrow of your keys and passwords into your estate plan

The latest Guardian column, "When I'm dead, how will my loved ones break my password?" describes the process the writer's wife and he went through when they drew up their wills and realized that their encrypted hard-drives and their network passwords would go with them if they died or were incapacitated, and how important it was for them to have a [...]

Exploit code for China’s “Green Dam” censorship app permits remote control of any Chinese PC

Exploit code for China’s “Green Dam” censorship app permits remote control of any Chinese PC

Wikileaks has published what is said to be proof that computers compliant with "Green Dam" can be maliciously controlled, using vulnerabilities in that censorware. Green Dam is a new Chinese state censorship program mandated to be provided with all PC's sold in China after July 1, 2009. The program "complements" the existing internet censorship [...]

Analysis of the Chinese Green Dam Censorware System

Analysis of the Chinese Green Dam Censorware System

Green Dam, the mandatory censorware that will be installed on all Chinese PCs as of July 1, is remarkably insecure. J Alex Halderman from Freedom to Tinker and his colleagues Scott Wolchok and Randy Yao have released a paper, based on a mere 12 hours testing, detailing attacks that can be used to "steal private data, send spam, or enlist the [...]

T-Mobile Investigating Claims It Was Breached

T-Mobile Investigating Claims It Was Breached

Elaborate hoax or the real deal? An anonymous post on a popular security disclosure site during the weekend claiming to have accessed T-Mobile's databases, financial documents, and other sensitive data has the wireless provider currently investigating whether the data and systems are truly in the hands of bad guys. A post on the Full Disclosure [...]

Wikipedia bans Church of Scientology

Wikipedia bans Church of Scientology

In an unprecedented effort to crack down on self-serving edits, the Wikipedia supreme court has banned contributions from all IP addresses owned or operated by the Church of Scientology and its associates. Closing out the longest-running court case in Wikiland history, the site’s Arbitration Committee voted 10 to 0 (with one abstention) in [...]

Researchers Take Over Dangerous Botnet

Researchers Take Over Dangerous Botnet

A group of researchers at the University of California-Santa Barbara boldly hijacked a notorious botnet known for stealing financial information and discovered that the botnet is even more dangerous than had been thought. Researchers at the University of California at Santa Barbara have published a report (.PDF) that exposes details about how [...]

NoScript: Security or Malware?

NoScript: Security or Malware?

Attention NoScript users · by Wladimir Palant Recently I wrote about how not giving extension developers a good way to earn money might lead to very undesirable effects. The recent events give an impression of the kind of effects we should expect here. This is going to be about the popular NoScript extension which happens to make its money from [...]

PIN Crackers Nab Holy Grail of Bank Card Security

PIN Crackers Nab Holy Grail of Bank Card Security

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator. The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report [...]

Despite Economy, Security Salaries Are On The Rise

Despite Economy, Security Salaries Are On The Rise

At a time when most companies' incentive plans consist of "you get to keep your job," most IT security staffers are still in the enviable position of receiving salary raises. According to early data from a forthcoming study being prepared by (ISC)2, 56 percent of security professionals in the U.K. received a salary increase in the past 12 [...]

RSA Security Pros Don’t Practice What They Preach

RSA Security Pros Don’t Practice What They Preach

Of all the events you might attend, you'd think a security convention would be the least likely place to have attendees hopping onto "free public WiFi" and other insecure connections. Unfortunately, you'd be wrong. In fact, a network monitoring study conducted at last week's RSA Conference by wireless security vendor AirPatrol turned up [...]

Iptables country blocklist API

Iptables country blocklist API

This tool will automatically create iptables rules on Linux system to block all connection from one country or more. The blocklist is created with an API that fetch data in our SQL database based on IP address country location. How often is data updated? During the first week of each month. How accurate is the data? This is a somehow [...]

 Page 5 of 14  « First  ... « 3  4  5  6  7 » ...  Last »