| Wednesday July 23rd 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

Hackers working on cracking the Googlephone’s firmware

Hackers working on cracking the Googlephone’s firmware

T-Mobile's new Google Android phone, the G1, is not as open as you'd hope -- all the good hardware is sandboxed off from the development environment and requires a signature to run. But hackers are already working to crack open the firmware. From the #android channel on Freenode: I hacked my camera's firmware manually by using an exploit to cause [...]

Microsoft to rush out emergency Windows patch

Microsoft to rush out emergency Windows patch

Microsoft will rush out an emergency security patch for Windows users on Thursday. The company offered few details on why it was releasing the software update, which is rated critical for users of Windows 2000, Windows XP, and Windows Server 2003. A critical flaw is worrisome, however, because it can be exploited by online attackers to seize [...]

The Pirate Bay Removes Fake Trackers from Torrents

The Pirate Bay Removes Fake Trackers from Torrents

Running the largest BitTorrent tracker on the Internet requires a lot of expensive hardware. To keep this hardware running smoothly, The Pirate Bay is constantly optimizing their setup. One of the latest changes is that they have started to automatically remove duplicate trackers from torrent files, to keep unnecessary connections between [...]

Hackers got into 18 computer servers at World Bank

Hackers got into 18 computer servers at World Bank

Cyberintruders used the Internet to crack into at least 18 computer servers at the World Bank Group last July. The intrusion, revealed Friday in a FoxNews.com story by veteran investigative reporter Richard Behar, underscores how relentlessly criminals probe corporate IT systems, especially banks, say tech-security experts. "The [...]

New NYPD Security Suite?

New NYPD Security Suite?

So I commute daily into NYC, which usually brings me thru Herald Square (Broadway and 34th). There is always a police presence but today before entering the subway entrance I hear this piston sounding noise and look over to the square. And what do i see rising out of the crowd: At first I was like WTF, then it went to UGH, and then I [...]

Russians use NVIDIA card to crack WPA/WPA2 security: WiFi is insecure again.

Russians use NVIDIA card to crack WPA/WPA2 security: WiFi is insecure again.

WiFi is no longer secure enough to protect wireless data. Global Secure Systems has said that a Russian's firm's use of the latest NVidia graphics cards to accelerate WiFi ‘password recovery' times by up to an astonishing 10,000 per cent proves that WiFi's WPA and WPA2 encryption systems are no longer enough to protect wireless [...]

Metasploit 3.2 Offers More “Evil Deeds”

Metasploit 3.2 Offers More “Evil Deeds”

Hacking into systems (albeit for testing purposes) is apparently getting easier with the upcoming open source Metasploit 3.2 framework, according to its creator. During a packed presentation at that SecTor conference here yesterday, Metasploit creator H. D. Moore detailed some of the new features in the upcoming Metasploit 3.2 release. They [...]

Financial Crisis Leaves Bank Branches Open to Social Engineering Attacks

Financial Crisis Leaves Bank Branches Open to Social Engineering Attacks

Heightened concern over the growing financial crisis is making banks more vulnerable to targeted social engineering and spear-phishing attacks, researchers said this week. Penetration testers who work with bank clients say the fragile state of the banking community is making it easier for them to dupe understandably anxious bank employees. Bank [...]

Kevin Mitnick detained then released after Colombia trip

Kevin Mitnick detained then released after Colombia trip

Since being released from prison eight years ago, Kevin Mitnick's brushes with the law have consisted of a few parking tickets and a citation for driving without a front license plate--that is, until he returned from a trip to Colombia two weeks ago. After landing at the Atlanta airport for a security conference, Mitnick was detained for four [...]

HOWTO: Bybass Windows 98 ‘s elite security system

HOWTO: Bybass Windows 98 ‘s elite security system

Network security alarm sounded by second-hand ebay sale

Network security alarm sounded by second-hand ebay sale

For less than a pound a security expert has got front-door access to a council's internal network. Andrew Mason from security firm Random Storm bought some network hardware from auction site eBay for 99p. When he switched it on and plugged it in, the device automatically connected to the internal network of Kirklees Council in West [...]

Clickjacking: Researchers raise alert for scary new cross-browser exploit

Clickjacking: Researchers raise alert for scary new cross-browser exploit

Researchers are beginning to raise an alarm for what looks like a scary new browser exploit/threat affecting all the major desktop platforms — Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Adobe Flash. The threat, called Clickjacking, was to be discussed at the OWASP NYC AppSec 2008 Conference but, at the request [...]

Iron Is Google Chrome for the “Tinfoil Hat” Crowd

Iron Is Google Chrome for the “Tinfoil Hat” Crowd

Free application Iron is a slightly modified version of the Chromium source of Google Chrome that removes components of Chrome that report your usage habits to Google. In practice, that means it removes your unique user ID, doesn't send user-specific info to Google, skips crash reporting, and doesn't check with Google for updates. Some [...]

Analyzing Malicious SSH Login Attempts

Analyzing Malicious SSH Login Attempts

Introduction Malicious SSH login attempts have been appearing in some administrators' logs for several years. This article revisits the use of honeypots to analyze malicious SSH login attempts and see what can be learned about this activity. The article then offers recommendations on how to secure one's system against these attacks. Using [...]

US Is Not Prepared to Handle Cyber Attacks

US Is Not Prepared to Handle Cyber Attacks

If the bad guys launched a coordinated cyber attack on the United States tomorrow, neither government nor industry would be able to stop it, experts warned legislators yesterday. At a hearing held by the House Permanent Select Committee on Intelligence, cyber defense experts testified that government agencies are insufficiently coordinated to [...]

Study: Hotel Networks Put Corporate Users at Risk

Study: Hotel Networks Put Corporate Users at Risk

You’re putting your company's data at risk when you connect to a hotel network, according to a new study examining Internet connections at U.S. hotels. The Center for Hospitality Research at Cornell University surveyed nearly 150 hotels and then conducted on-site vulnerability testing on a sampling of about 50 hotels. About 20 percent of [...]

New “On/Off Switch” Protects RFID Cards From Hacking

New “On/Off Switch” Protects RFID Cards From Hacking

A U.K. firm has developed an on/off “switch” for RFID cards that could protect cardholders from being hacked. The cardholder activates the RFID transmission by squeezing the card between his thumb and forefinger when it must be scanned by a reader. The patented polymer-based technology comprised of metal particles is embedded into a [...]

Cisco Packages Home Office Security

Cisco Packages Home Office Security

Cisco Systems today took a new whack at an old problem: securing the connection from workers' homes to the corporate network. The Cisco Virtual Office (CVO) packages routing, switching, security, wireless, IP telephony, and policy control technology into a single bundle that can be deployed and managed uniformly, no matter how many employees a [...]

KFC Tightens Security For Secret Recipe

KFC Tightens Security For Secret Recipe

Pssst. The secret's out at KFC. Well, sort of. Colonel Harland Sanders' handwritten recipe of 11 herbs and spices was to be removed Tuesday from safekeeping at KFC's corporate offices for the first time in decades. The temporary relocation is allowing KFC to revamp security around a yellowing sheet of paper that contains one of the country's most [...]

Meet Frankenboob (Don’t Throw Out Old Hard Drives!)

Meet Frankenboob (Don’t Throw Out Old Hard Drives!)

Aug 31st is move-out day in college town, and that means dumpster diving! This years haul: 3 computers (2 P4 Dells and an HP Laptop!), a 20" monitor, 2 power conditioners, a lot of furniture and the Cryptonomicon! So, after booting up the computers and a bit of poking around, we found this in Mr. Kyle M's photos folder... People! Never, ever [...]

 Page 9 of 14  « First  ... « 7  8  9  10  11 » ...  Last »