Best Of Web
Best Of The Web
Washington's Cyberwar Rhetoric Is Inflammatory, Analysts Say
University researchers say China is even less ready for cyberconflict than U.S.
HAWAII NEWS NOW
Former Beauty Queen Sentenced To 20 Years In Prison For Identity Theft
Woman allegedly stole data from as many as 23 individuals in Honolulu's biggest ID theft case
I Smell A RAT: Java Botnet Found In The Wild
Cross-platform malware is becoming more popular than ever, researchers say
Marlinspike's Droid Firewall Kills Tracking
Dynamic Android firewall stops location tracking apps
NetFlix Fires Call Center Worker For Stealing Data
Unnamed employee allegedly stole credit card data from customers
As PlayStation Network Tries To Get Back Online, Sony Points To Anonymous
Company tells Congress that breach occurred while it was attempting to defend itself against attacks
Court OKs Firing Of Boeing Computer-Security Whistleblowers
A federal appeals court ruled that two Boeing auditors were legally fired after they exposed to the press internal documents suggesting the aerospace and military contractor lacked computer-security safeguards
Metasploit Framework 3.7.0 Released!
The new version of the Metasploit Framework overhauls how sessions are tracked within the framework and associated with the backend database.
KREBS ON SECURITY
RSA Among Dozens Of Firms Breached By Zero-Day Attacks
The attackers who breached RSA appear to have used some of the same websites, tools, and services to hack into dozens of other companies during the past year, including some of the Fortune 500 companies protected by RSA
Pa. Lawsuit: Rental Firm Spies On Users
A major rental chain has software on its computers that lets it track the keystrokes, screenshots, and webcam images of customers while they use the rented systems at home, a lawsuit filed yesterday claims
Is There Anything To Find On Bin Laden's Hard Drive?
Remains to be seen if Osama Bin Laden's data is encrypted and with what type of encryption
ELECTRONIC FRONTIER FOUNDATION
New FBI Documents Provide Details On Government's Surveillance Spyware
EFF recently received documents from the FBI that reveal details a tool that when installed on a target computer lets the FBI collect machine specifics, IP address, user name, and other information
New MAC OS X Scareware Delivered Through Blackhat SEO
MACDefender includes a phony interface that alerts the user that he is infected and periodically opens pornographic content to let the user think he has been infected
The X Factor Hit By Database Breach, Leading To Quarter Of A Million Personal Details Being Stolen
Simon Cowell's computer network was hacked and personal information on 250,000 entrants to the U.S. version of the talent show were stolen
Hacker Pwns Police Cruiser And Lives To Tell Tale
Pen tester shows how "situational awareness" video systems could enable civilians to spy on police
Osama's Death In Twitter
Cybercriminals use news of bin Laden's death to create new attacks on social networks
IT SECURITY PORTAL
Card Crime Is The Biggest Financial Fraud Threat For Consumers
Yet many consumers still fail to take basic precautions, study says
Private Contractors Take Up Arms Against The Cyberthreat
Individual contractors step forward to supplement government efforts
BANK INFO SECURITY
FFIEC Guidance: Compliance Begins
Fraud incidents push banks to enhance authentication now
Europe's "Single Secure Cyberspace" Plan Under Attack
Civil liberties group argue against DMZ for blocking "illicit content"
Sony Online Entertainment Reports More Problems
Company shuts down games, forums, and websites in hacking investigation
Sony Hacked Again; 25 Million Entertainment Users' Info At Risk
Some 20,000 credit cards also added to the 70 million accounts compromised last week
THE EPOCH TIMES
China Fights A War Without Firing A Gun
China's strategy to use cyberattacks and other means to target and destroy the U.S. economy was outlined in "Unrestricted Warfare" in 1999
Attackers Set Sights On Mac OS X With Apple Malware Toolkit
New Apple malware crimeware toolkit targeting Mac OS X has been discovered, and it's called the Weyland-Yutani BOT
Rabobank Network Floored By Cyberattack
Origin of denial-of-service attack is still unknown, bank says
Osama Bin Laden Scams On Facebook
A look at several different scams that appeared within 24 hours of the announcement
Sony Offers Update On PlayStation Network Hack
Passwords were not technically encrypted, but they weren't stored in the clear either, gaming giant says
Texas Comptroller Takes Blame For Major Breach
Breach already has led to firing of two IT execs
Sony: 'PSN Attacker Exploited Known Vulnerability'
Sony is preparing to return to service some PlayStation Network offerings as it tries to find the source of the April attack on its San Diego data center
Malware Sites Already Capitalizing On Announcement Of Osama Bin Laden's Death
Within hours of the announcement of Osama Bin Laden's death, malicious websites are already appearing to capitalize on the news
The Dangerous Side Of Online Romance Scams
The IC3 says scammers target individuals who search for companionship or romance online, with the the principal group of victims being over 40 years old and divorced, widowed, elderly, or disabled
VoIP Security Risks Are Often Overlooked, Says Forrester Analyst
Many organizations seem to be unaware of the security challenges of voice-over-IP and forget to ask about security
THE IRISH TIMES
Trinity College Dublin Reports Data Breach
A file with the names of students and staff of Trinity College Dublin, along with their addresses, ID numbers and email addresses, was inadvertently made accessible on a local network
DOJ Report Critical Of FBI Ability To Fight National Cyber Intrusions
Inspector General says FBI in some case lacks the skills to properly investigate national security intrusions
THE BAY CITIZEN
Pressure Mounts For U.S. To Intervene In Attacks On SF Website
Startup Change.org has been under DDoS attack for a week since it hosted a petition calling for release of Chinese dissident Ai Weiwei
Teacher Passwords Stolen, Grades Hacked At 3 Seattle High Schools
Teacher passwords were stolen and grades changed in a Seattle Public Schools computer system, and the hack occurred via keyloggers plugged into USB ports that sniffed credentials
Obama Birth Certificate Image Search Results Poisoned
Google Image searches for President Obama's birth certificate have been poisoned with malicious links that lead users to fake antivirus
Bizarre Pornography Raid Underscores Wi-Fi Privacy Risks
Unsecured routers have led to some owners being mistakenly accused of downloading child pornography, as pornographers have hijacked their Internet connections
Amazon Opens Up About Cloud Security Breach
Amazon provided a bit more detail on the cloud security issues that caused outages last week, noting that it would publish a report on the outage
EUGENE KASPERSKY FACEBOOK NOTE
Vanya Is Back Home Safe And Sound. Thanks For Your Support!
Kaspersky says the kidnapping of his son was an exception, and that Moscow is safe
Best Of Web Archive:
Most Recent | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216
Free Research and Reports
- The Language of UX: Beyond Buzzwords -
- Discover the opportunities and challenges associated with mobile retail - Mobile Commerce World - Mobile Commerce World
- Get practical information on how to develop your organization's mobile commerce application - Mobile Commerce World - Mobile Commerce World
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
Dark Reading Digital Magazine
In This Issue
- Endpoint Security: End user security requires layers of tools and training as employees use more devices and apps.
- Security Isn't A Piece Of Cake: It's time we rethink the conventional wisdom about security layering.
- BYOD Is Here To Stay: Trying to keep employees' devices off the network is futile.
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
Buffer overflow in secars.dll in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1.x before 12.1.3, and Symantec Endpoint Protection Center (SPC) Small Business Edition 12.0.x, allows remote attackers to execute arbitrary code via unspecified vectors.
The Flash plug-in in Google Chrome before 27.0.1453.116 does not properly determine whether a user wishes to permit camera or microphone access by a Flash application, which allows remote attackers to obtain sensitive information from a machine's physical environment via a clickjacking attack, as demonstrated by an attack using a crafted Cascading Style Sheets (CSS) opacity property.
Cross-site scripting (XSS) vulnerability in IBM Sterling Control Center (SCC) 5.2 before 184.108.40.206, 5.3 before 220.127.116.11, and 5.4 through 18.104.22.168 allows remote authenticated users to inject arbitrary web script or HTML via vectors involving invalid characters.
An unspecified buffer-read method in IBM Sterling Control Center (SCC) 5.2 before 22.214.171.124, 5.3 before 126.96.36.199, and 5.4 through 188.8.131.52 allows remote authenticated users to cause a denial of service via a large file that lacks end-of-line characters.
The 3G Mobile Hotspot feature on the HTC Droid Incredible has a default WPA2 PSK passphrase of 1234567890, which makes it easier for remote attackers to obtain access by leveraging a position within the WLAN coverage area.