| Tuesday July 29th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

Misconceptions About Laptop Encryption May Put Data At Risk

Misconceptions About Laptop Encryption May Put Data At Risk

Now that they have encryption capabilities on their laptops, many end users may be overconfident about the safety of the data that resides on them, according to a study published this week. The laptop encryption study, conducted by Ponemon Institute and sponsored by security vendor Absolute Software, found that many workers think the data on [...]

Twitter Cracker Says Admin Password Was “Happiness”

Twitter Cracker Says Admin Password Was “Happiness”

An 18-year-old "hacker" with a history of celebrity pranks has admitted to Monday's hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama's, and the official feed for Fox News. The "hacker," who goes by the handle GMZ, said on Tuesday he gained entry to Twitter's administrative control panel by pointing an [...]

Paypal’s Anti-Fraud Authentication Token

Paypal’s Anti-Fraud Authentication Token

PayPal, the online payment company owned by Internet auction giant eBay, is selling a "security key" to help customers prevent their accounts from being hijacked if someone guesses or steals their passwords. The key is a small, oval fob that generates a random, new six-digit passcode every 30 seconds, using technology purchased from Verisign [...]

Why are gun sales soaring?

Why are gun sales soaring?

Before a standing army can rule, the people must be disarmed; as they are in almost every kingdom in Europe. The supreme power in America cannot enforce unjust laws by the sword; because the whole body of the people are armed, and constitute a force superior to any band of regular troops that can be, on any pretence, raised in the United States. A [...]

Celebrity Twitter Accounts Hacked

Celebrity Twitter Accounts Hacked

My guess is this has nothing to do with the phishing attacks that started on Twitter a couple of days ago. But a few minutes ago the official Fox News Twitter account posted “Breaking: Bill O Riley is gay” (referring to the host of the popular Fox show O’Reilly Factor), right after a legitimate message about making turkey lettuce [...]

One Hacker’s Audacious Plan to Rule the Black Market in Stolen Credit Cards

One Hacker’s Audacious Plan to Rule the Black Market in Stolen Credit Cards

The heat in Max Butler's safe house was nearly unbearable. It was the equipment's fault. Butler had crammed several servers and laptops into the studio apartment high above San Francisco's Tenderloin neighborhood, and the mass of processors and displays produced a swelter that pulsed through the room. Butler brought in some fans, but they didn't [...]

MD5 collision creates rogue Certificate Authority

MD5 collision creates rogue Certificate Authority

At the 25th Chaos Communication Congress (25C3) convention, researchers will reveal how they utilized a collision attack against the MD5 algorithm to create a rogue certificate authority. This is pretty big news, so read on. When you make a secured connection to a website via HTTPS, a public key certificate is sent from the server to your [...]

Top 500 Worst Passwords

Top 500 Worst Passwords

From the moment people started using passwords, it didn’t take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some insight into how predictable [...]

Fedora 10′s D-Bus Update Causes Procedural Discussions

Fedora 10′s D-Bus Update Causes Procedural Discussions

Fedora recently issued a security update for D-Bus which broke a number of applications on generic Fedora systems. One of the areas affected was PackageKit -- essentially leaving those accustomed to updating their systems with the Fedora GUI tools unable to do so in this manner. The fix detailed by Paul Frields (issuing the command "su -c 'yum [...]

HOWTO: Carry a gun onto an airplane

HOWTO: Carry a gun onto an airplane

Wanna carry a gun onto an airplane? It's easy -- just get any government ID (the cards issued to part-time assistant harbor masters on Cape Cod will do) and then tell the TSA that you need a "flying while armed" form. Not only will they let you bring your gun onto the plane, they'll helpfully bring you into the cockpit (with your gun) and tell who [...]

Firefox users targeted by rare piece of malware

Firefox users targeted by rare piece of malware

This is not unthinkable. There have been arbitrary-code vulnerabilities in the recent past. Ugh... Researchers at BitDefender have discovered a new type of malicious software that collects passwords for banking sites but targets only Firefox users. The malware, which BitDefender dubbed Trojan.PWS.ChromeInject.A sits in Firefox's add-ons [...]

How Dan Kaminsky broke and fixed DNS

How Dan Kaminsky broke and fixed DNS

Wired's Joshua A Davis has a great profile of Dan Kaminsky's work on discovering and then helping to fix a net-crashing DNS bug earlier this year. Davis really captures the excitement of discovering a major security flaw and the complex web of personal, professional and technical complications that come to bear when you're trying to disclose the [...]

Microsoft cleans fake antivirus tool from 994,061 PCs

Microsoft cleans fake antivirus tool from 994,061 PCs

The Malicious Software Removal Tool (MSRT) is a small program Microsoft pushes out to computers on Patch Tuesday to clean out a list of malware. On this month's Patch Tuesday, Microsoft added scans for a malware file that masks itself as security software, and it found plenty of copies. Win32/FakeSecSen has gone by various names, including [...]

Today’s Script kiddies have awesome tools

Today’s Script kiddies have awesome tools

Interesting writeup from an Admin that found an exploit installed in a Wordpress blog installation. I have found these before, but beware - a lot of experienced crackers will upload this kind of stuff into an install folder of Phpmyadmin or Wordpress so that you become convinced the culprit of your attack was a flaw in the popular software when, [...]

The Seven Deadliest Social Networking Hacks

The Seven Deadliest Social Networking Hacks

It started with a stolen Facebook photo attached to an inflammatory profile. It led to online harassment, death threats, and emails to the victim’s boss questioning the victim’s character. But an online personal attack against Graham Cluley earlier this year is one example of how easy it is to use a social network to damage the identity of an [...]

Mozilla SSL policy bad for the Web

Mozilla SSL policy bad for the Web

Mozilla Firefox 3 limits usable encrypted (SSL) web sites to those who are willing to pay money to one of their approved digital certificate vendors. This policy is bad for the web. Not only does it make users less secure overall by reducing the number of encrypted connections, it damages the basic principle of equality among web [...]

Student points out school server security flaws and gets charged with 3 felonies

Student points out school server security flaws and gets charged with 3 felonies

A 15-year-old high school student in New York State has been charged with three felonies after he allegedly accessed personnel records on his school's poorly configured computer network and then notified his principal of the security weakness. The unnamed student of Shenendehowa Central School was charged Thursday with computer trespass, [...]

West Virginia “Vote Flipping” Caught on Tape

Video the Vote went to Jackson County, WV, in response to numerous reports of machine vote flipping. The local county clerk showed us the machines in question, but the demonstration left us with serious questions, as the machine continued to malfunction even after it was calibrated. (more…)

Hacking Car Security Systems and Remote Keyless Entry (RKE)

Hacking Car Security Systems and Remote Keyless Entry (RKE)

Yet another hack for RKE? We, as the designers for secure systems, should keep developing our systems and protect the Achilles' heel (security weakness) relatively. The modern vehicles are equipped with various access control systems to prevent being stolen. The manufacturers promote many products such as immobilizer, RKE (Remote Keyless Entry), [...]

New US RFID passports manufactured offshore at a huge profit and transported by unsecured couriers

New US RFID passports manufactured offshore at a huge profit and transported by unsecured couriers

You know those new, super-secure, RFID-enabled passports the US is issuing to its citizens? They're manufactured and assembled offshore, in sometimes-unstable regions, the blanks are shipped around using unsecured couriers, and they're sold to US citizens at an 85% profit. I feel safer already. Each new e-passport contains a small computer chip [...]

 Page 8 of 14  « First  ... « 6  7  8  9  10 » ...  Last »