Security

ID theft, vulnerabilities, privacy issues, etc

Phishing Scam Targets Windows Update

Filed under
Microsoft
Security

A phishing scam emulating the Windows Update Service hit Australia yesterday, designed to not only emulate the update page perfectly, but circumvent current antivirus, spyware and adware programs.

US nuclear waste could provide terror target

Filed under
Security

A large cloud of lethal radioactive fallout could be released by a terrorist attack on the nuclear waste stored at up to 103 reactors in the US, according to an expert report for the US National Academy of Sciences.

Oh great, let's give 'em ideas! Tongue

DNS attacks on the up

Filed under
Security

The SANS Institute's Internet Storm Centre (ISC) has said that domain name system attacks are becoming more widespread since they were first reported last month.

Open-Source Security Tools Touted at InfoSec

Filed under
OSS
Security

A well-known security consultant on Tuesday urged cash-strapped businesses to consider using free, readily available open-source security tools and applications to help cope with the rising spate of malicious hacker attacks.

Flaw found in Firefox

Filed under
Security

A flaw has been discovered in the popular open-source browser Firefox that could expose sensitive information stored in memory, Secunia has warned.

Cyber-Terrorism Analyst Warns Against Complacency

Filed under
Security

Florida-Cyber-security and counterterrorism analyst Roger Cressey on Monday pleaded with IT executives not to underestimate the threat of "national cyber-event" targeting critical infrastructure in the United States.

Linux Kernel Denial of Service Vulnerability

Filed under
Linux
Security

Daniel McNeil has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

Flurry Of Patches From Unix Vendors For Telnet Flaw

Filed under
Security

Several distributors of the BSD version of the Telnet protocol have released patches for a critical bug that could cause system-hijack attacks. Advisories and patches have been issued by FreeBSD, MIT (Kerberos), Red Hat, and Sun among others.

Federal Agency Nixes Your Right to Privacy

Filed under
Security
Web

Today I have the unfortunate responsibility of informing you that there has been a decision made by bureaucrats of a Federal agency that takes away your right to privacy as guaranteed by the United States Constitution.

This decision was unilaterally made by the National Telecommunications and Information Association ("NTIA") -- http://www.ntia.doc.gov/ -- without hearings that would determine the impact on those affected, and delivered without notice -- in short, the NTIA decision was made without due process of any kind. This is exactly how our government is not supposed to work.

Spam King bankrupted by Microsoft

Filed under
Microsoft
Security
Legal

A Colorado company sued by Microsoft Corp. under anti-spam laws has filed for Chapter 11 bankruptcy.

Safety Cheat Sheet

Filed under
Security
Web

If people didn't fall for online scams, online scammers would take up another line of work. And really, it isn't terribly hard to protect yourself. If you do one thing today, print out the following list and tape it to your computer.

Stolen laptop exposes data of 100,000

Filed under
Security

A thief recently walked into a University of California, Berkeley office and swiped a computer laptop containing personal information about nearly 100,000 alumni, graduate students and past applicants, highlighting a continued lack of security that has increased society's vulnerability to identity theft.

ISPs join to 'fingerprint' Internet attacks

Filed under
Security
Web

Leading global telecommunications companies, Internet service providers and network operators will begin sharing information on Internet attacks as members of a new group called the Fingerprint Sharing Alliance, according to a published statement from the new group.

You Get What You Pay For

Filed under
Linux
Microsoft
Security

Purely objective information about security issues is becoming one of the scarcest commodities in the tech industry.

Linux, others are used behind the scenes

Filed under
OSS
Security

Corporations, government agencies and even consumers are tinkering with open-source software, which can be downloaded free from the Internet.

War of words over operating systems' safety

Filed under
Linux
Microsoft
Security

Doubts were cast this week over the security of three major software systems formerly regarded as safe havens from hacker attacks and viruses.

But experts argue that despite the new findings, these systems are still more secure than their Microsoft counterparts because hackers overwhelmingly target the Windows software.

Drive-by Trojans exploit browser flaws

Filed under
Security

Symantec blames Trojans for an upsurge in client-side exploits for web browsers. Between July and December 2004 Symantec documented 13 vulnerabilities affecting Internet Explorer and 21 vulnerabilities affecting each of the Mozilla browsers. Six vulnerabilities were reported in Opera and none in Safari.

Personal data of 59,000 people stolen

Filed under
Security

Hackers gained personal information of 59,000 people affiliated with a California university - the latest in a string of high-profile cases of identity theft.

Linux lags Windows in new security report

Filed under
Linux
Microsoft
Security

A M$ funded report released today indicates Windows Server 2003 may actually be more secure than its most popular Linux competitors.

It isn't like it was 'co-funded' by both Microsoft and Red Hat," said Michael D. "Mick" Bauer, senior editor of Linux Journal.

Does Your Wi-Fi Hotspot Have an Evil Twin?

Filed under
Security

Identity thieves are going wireless in their quest to steal your personal info.

You may want to think twice before logging into a public wireless hotspot. Sure, grabbing a few minutes of connectivity is convenient, but identity thieves are discovering that, through "evil twin" attacks, hotspots are a great way to steal unsuspecting users' private information. So how does an evil twin attack work?

Syndicate content