Disturbing AdwareRecently emerging unwanted toolbars appear in your web browser. Do you often find your default search engine changed to a search engine that is unfamiliar? It is an attack of adware (advertisement attack) that originated from the application installation mistake on your computer. Most providers download...
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
undefined
undefined
Chrome 26 is officially out and, as always, the latest stable channel update comes with a number of improvements in the security section. However, on this occasion, only 2 high-severity vulnerabilities have been addressed.One of the high-severity flaws has been uncovered by Atte Kettunen of OUSPG. The expert has been rewarded...
undefined
undefined
VoIP services regularly get into trouble in countries where governments like to keep a solid grip on what people are talking about and with whom.No, not the US this time, Saudi Arabia is the latest to join the anti-Skype brigade as it threatens to ban essentially all VoIP communications in the country unless those communications...
undefined
undefined
If you find that your Twitter password doesn't work the next time you try to login, you won't be alone. The service was busy resetting passwords and revoking cookies on Friday, following an online attack that may have leaked the account data of approximately 250,000 users."This week, we detected unusual access patterns...
undefined
undefined
Application security solutions provider Radware has released its 2012 Global Application and Network Security Report. According to the study, distributed denial-of-service (DDOS) attacks are becoming more sophisticated and more severe.In addition, cybercriminals have started deploying new attack tools, such as server-based...
undefined
undefined
Foxit Reader, a PDF viewer application often used as an alternative to the more popular Adobe Reader, contains a critical vulnerability in its browser plug-in component that can be exploited by attackers to execute arbitrary code on computers.Details about the vulnerability and how it can be exploited were publicly disclosed...
undefined
undefined
A hacker called AnonVoldemort claims to have gained access to the databases of Miestukarai.lt, a Lithuanian online game that appears to have almost 35,000 players.In the tweet announcing the hack, AnonVoldemort revealed that he had leaked over 24,000 accounts, both free and premium.The data has been removed since from...
undefined
undefined
Earlier this month, unknown hackers managed to gain illegal access to the details of around 36,000 individuals who were somehow connected to the US Army command center formerly located at Fort Monmouth.According to APP, the details of Communications-Electronics Command (CECOM) and Command, Control, Communications, Computers,...
undefined
undefined
16-year-old security researcher Thamatam Deepak has identified a number of three cross-site scripting (XSS) vulnerabilities and a cookie handling flaw on the website of world-renowned smartphone manufacturer HTC.The expert said the vulnerabilities – which affected pages such as product security, account information, and...
undefined
undefined
Google has taken two steps to prevent its Chrome browser becoming an attack vector for malware that runs as extensions to the browser.Like many other browsers, Chrome allows users to install “extensions”, apps that add functionality. Google even runs the “Chrome Web Store” to promote extensions.Security outfit Webroot...
undefined
undefined
W3 Total Cache, which boasts high-traffic sites like Mashable and Lockergnome among its users, has serious vulnerabilities, according to this post on the Full Disclosure list.The default setup – that is, when users simply choose “add plugin” from the WordPress catalogue – left cache directory listings enabled, according...
undefined
undefined
Kaspersky Anti-Virus & Internet Security 2013 provides a wide range of technologies to protect your privacy and your identity – including two unique security features for entering personal information online.Secure Keyboard is a new Kaspersky technology that automatically activates whenever you open a bank website...
undefined
undefined
A series of posts on ExploitDB by an author signing as "King Cope" reveal a new set of MySQL vulnerabilities – along with one issue that could just be a configuration issue.The vulnerabilities, which emerged on Saturday, include a denial-of-service demonstration, a Windows remote root attack, two overrun attacks that work...
undefined
undefined
Avoid Plagiarism - Disable copy paste on blogger - What should I do when my article being copied -- It feels really uncomfortable after many minutes even hours to write, suddenly came the thieves article. Casually and without guilt they copy-paste our articles to their blogs. I actually does not mind if I copy-paste...
undefined
undefined
Last week Russian developer Alexey Borodin hacked Apple's In-App Purchase program for all devices running iOS 3.0 or later, allowing iPhone, iPad, and iPod touch users to circumvent the payment process and essentially steal in-app content. Apple today announced a temporary fix and that it would patch the holes with the...
undefined
undefined
Russian developer ZonD80 has figured out how to circumvent Apple's iOS In-App Purchase program, allowing iPhone, iPad, and iPod touch users to grab digital game items, upgrade to full versions of apps, and purchase additional content for free. As first spotted by Russian blog i-ekb, the video above shows an "in-app proxy"...
undefined
undefined
Hackers posted what appear to be login credentials for more than 453,000 user accounts that they said they retrieved in plaintext from an unidentified service on Yahoo.The dump, posted on a public website by a hacking collective known as D33Ds Company, said it penetrated the Yahoo subdomain using what's known as a union-based...
undefined
undefined
In July the Internet Systems Consortium will permanently shut down DNS servers deployed to serve as temporary surrogates for rogue DNS servers shut down as part of Operation Ghost Click, an FBI operation that brought down an Estonian hacker ring last year. If your PC is one of the more than 1 million computers infected...
undefined
undefined
Keeping Data Safe on the Internet - An owner of a small shed blood, sweat, tears perhaps even to build their businesses. For some, they've had dreams of $ 20is comes with sacrifice. However, how many ever stop and think about the fact that more terrible than business ownership?Of a number of studies, only a few employers...
undefined
undefined
Summary: The Anonymous hacktivist movement is planning to launch a distributed denial of service attack (DDoS) on the Internet’s root DNS servers, using a Reflective DNS Amplification DDoS tool.According to a note left by members of the Anonymous hacktivist movement on Pastebin.com, the group is planning to launch a distributed...