Items tagged with security
Notebook Computer Study Reveals Security Implications of Mobile Workforce Study Uncovers Surprising Financial Repercussions of Lost and Stolen Notebooks SANTA CLARA, Calif., April 22, 2009 – An independent study on notebook security, commissioned by Intel Corporation, analyzes the potential business costs of stolen or lost notebook computers,...
Read more...
Mozilla released Firefox 3.0.9 yesterday, fixing more than nine security flaws - some of which were termed critical, causing crashes in Firefox 3 and, occasionally, in Firefox 2. Some of the crashes corrupted memory.One of the issues dealt with JavaScript running in mail programs on Firefox and Thunderbird (which shares the Firefox browser...
Read more...
Anyone paying close attention to the computing industry would realize that a few trends are picking up steam. Netbooks, smartphones and cloud computing -- and that's just to name a few. Cisco Systems, which definitely isn't immune to security breaches, is keying in on the latter one with a new network security lineup engineered to "help protect...
Read more...
It doesn't carry quite the same weight as the Warren Commission report and it might even contain more redactions than the Nixon tape transcripts, but recently-released FBI documents obtained by Wired News via the Freedom of Information Act (FOIA) prove that the FBI has been using its own version of spyware for years to catch cyber-criminals....
Read more...
Toshiba’s Self-Encrypting Drive Technology will make its debut at the RAS conference in San Francisco. The conference begins April 21st. The new technology supports the Trusted Computing Group (TCG) Storage Architecture Core Specification, as well as the Storage Security Subsystem Class (SSC) Opal Specification. Toshiba’s encryption package...
Read more...
We knew that spam e-mails drained our time, resources, and productivity, but apparently spam is also contributing to global warming. Security-technology company, McAfee, and the technology-research company, ICF International, have just released a joint study that claims that the 62 trillion spam e-mails sent in 2008 generated approximately...
Read more...
We had all been warned: April 1 was the day that the infamous DOWNAD/Conficker worm was supposed to activate and do its dastardly deeds, whatever they might be. The day came and went without a whimper of Conficker-initiated destruction, although that didn't stop countless media outlets from reporting on it (HotHardware included). Conficker...
Read more...
The Conficker worm has generated a fair amount of buzz in the media recently. Today, April 1, was suppose to be the worm’s day of attack. As of this evening eastern standard time, the doomsday some were predicting as a result of the Conficker worm did not materialize. That doesn’t mean Conficker is a bust, however. The worm still did what...
Read more...
Reportedly, April Fool's Day will not be too amusing for millions of computer users, as the Conficker worm is anticipated to take full effect. The Conficker worm was released to the wild in October 2008. It targets Microsoft Windows machines specifically and its symptoms manifest as network congestion, account lockout policies being reset,...
Read more...
After a 10-month cyber espionage investigation, researchers have found 1,295 computers in 103 countries with software that is capable of stealing information from high-profile targets such as the Dalai Lama and government agencies around the world. In the report published today by Information Warfare Monitor, a Toronto-based organization,...
Read more...
No less than three different browser platforms have succumbed to zero-day exploits by the end of the first day of the three-day long, third-annual Pwn2Own contest being held at the CanSecWest 2009 digital security conference in Vancouver, British Columbia. Safari on Mac OS X was the first to fall, followed by Internet Explorer 8 (IE8) on Windows...
Read more...
Googling your own name might not be such a narcissistic activity after all; in fact, it just must save you from identity theft. At least that's what Kevin Andreyo, a Wilkes University professor, discovered when he used the "deep web" search engine, Pipl, to see what information about him might be publicly available on the Internet. What he...
Read more...
With data theft seeming to be increasing in frequency (read this and this), a California legislator has introduced a bill that would make companies report more information to people affected by the breaches.State Sen. Joe Simitian's bill would require companies involved to report to the state attorney general any data breach that affected...
Read more...
TRENDnet Launches a High Performance Wireless N Internet Security Camera TORRANCE, Calif. -March 3, 2008-TRENDnet, a best-in-class wired and wireless networking hardware brand, today announces the launch of the Wireless N Internet Camera Server with 2-Way Audio, model TV-IP512WN, which offers unsurpassed wireless range and video streaming...
Read more...
Those white-hat-wearing, security-exploit-finding folks over at TippingPoint Digital Vaccine Laboratories are at it again. At the CanSecWest 2009, digital security conference to be held in Vancouver, British Columbia, next month, TippingPoint's Zero Day Initiative (ZDI) team will be sponsoring their third annual Pwn2Own contest. This time...
Read more...
Earlier this week, Charles Miller, principal security analyst at Independent Security Evaluators, discovered a bug in the multimedia subsystem Android uses for its browser. Initially, Miller warned that the bug could be used to run arbitrary code in the phone’s Web browser. As a result, he urged users to use the browser on the T-Mobile...
Read more...
Microsoft and nearly 20 other organizations and firms have joined forces to formulate a coordinated, global response to the Conficker (AKA Downadup) worm. At the same time, Microsoft announced a $250,000 reward for information that leads to the conviction of the hackers behind Conficker. The last time Microsoft offered a reward was in 2004,...
Read more...
Research in Motion issued a security alert today for its customers who use the BlackBerry Application Web Loader and Microsoft Internet Explorer.Basically, the web loader's ActiveX control has a vulnerability that can allow someone to attack the device remotely or cause the browser to crash.In the company's own words: An exploitable buffer...
Read more...
Internet security and infrastructure service provider, OpenDNS, and security software provider, Kaspersky Lab, have collaborated to help alert users that their systems are infected by one of the "most widely-spread" worms to come our way, the Conficker worm. The Conficker worm, which is also called Kido and Downadup, first popped up "in late...
Read more...
Only one day after Google has released its social networking, location-aware application, Google Latitude, a privacy advocacy group is claiming that Google Latitude has "a fundamental design problem that could substantially endanger user privacy." Even though Google Latitude is designed to minimize privacy risks, Privacy International claims...
Read more...
Using a combination of social engineering and malicious software, an innovative new way to get people to install malware on their computers has recently popped up, and it all starts with finding a flier on your car's windshield stating that your car is illegally parked. The fliers are fake, but they prey on people's fears by stating, "PARKING...
Read more...
IBM Raises the Bar on Security TestingIBM Internet Security Systems Challenges the Security Industry to Support Monthly Testing for Consistent, Pre-Emptive Security Against Evolving ThreatsATLANTA, GA - 03 Feb 2009: IBM (NYSE: IBM) announced today it is the first vendor to commit to monthly testing to measure the security effectiveness across...
Read more...