Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
As the pool of easily exploitable Windows security bugs dries up, hackers are looking for holes in security software to break into PCs, analysts said.
"Want drive fast cars?" asks an advertisement, in broken English, atop the Web site iaaca.com. "Want live in premium hotels? Want own beautiful girls? It's possible with dumps from Zo0mer." A "dump," in the blunt vernacular of a relentlessly flourishing online black market, is a credit card number. And what Zo0mer is peddling is stolen account information - name, billing address, phone - for Gold Visa cards and MasterCards at $100 apiece.
The Federal Deposit Insurance Corp. has joined a growing number of public- and private-sector entities that have had to tell employees that their personal data has been stolen.
A security breach of customer information at a credit card-processing company could expose to fraud up to 40 million cardholders of multiple brands, MasterCard International Inc. said Friday.
It takes only a few seconds for your financial identity to be stolen, but months to get it back and clean up the credit mess. Aware of consumers' frustration and fear, the government wants Congress to consider more protections.
The UK's key computer systems are being targeted by Trojan software apparently originating from the Far East, firewalls and antivirus software useless, warns UK security agency.
Public peer-to-peer networks have always been associated with adware program distributions, but BitTorrent, the program created by Bram Cohen to offer a new approach to sharing digital files, has managed to avoid the stigma.
Cryptographers have found a way to snip a digital signature from one document and attach it to a fraudulent document without invalidating the signature and giving the fraud away.
The celebrity whose name is used most by hackers creating computer e-mail viruses has shifted from Microsoft chief Bill Gates to pop singer Britney Spears.
Most Americans believe the government should do more to make the Internet safe, but they don't trust the federal institutions that are largely responsible for creating and enforcing laws online, according to a new industry survey.
Sun Microsystems has fixed a pair of security bugs in Java that could be exploited by attackers to take over computers running Windows, Linux and Solaris.
Thousands of websites may be at risk from a new form of network attack that involves burying harmful packets of data within seemingly legitimate ones.
A man was arrested Monday for allegedly setting up a phony Internet portal site to lure victims into giving personal data, an official said. Police said it was Japan's first arrest linked to a form of identity theft called phishing.
VP of Threat Research at an anti-spyware company announced his predictions for 2005 in relation to security vulnerabilities. Most of the predictions were fairly predictable, however at least one of the predictions causes a pause for further thought.