Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
undefined undefined

Easy Way to Remove Ask.com Conduit toolbar (Adware) on browser

Disturbing AdwareRecently emerging unwanted toolbars appear in your web browser. Do you often find your default search engine changed to a search engine that is unfamiliar? It is an attack of adware (advertisement attack) that originated from the application installation mistake on your computer. Most providers download...
undefined undefined

11 Security Holes Addressed by Google in Chrome 26

Chrome 26 is officially out and, as always, the latest stable channel update comes with a number of improvements in the security section. However, on this occasion, only 2 high-severity vulnerabilities have been addressed.One of the high-severity flaws has been uncovered by Atte Kettunen of OUSPG. The expert has been rewarded...
undefined undefined

Saudi Arabia Government Threatens to Ban Skype, WhatsApp and other VOIP Services

VoIP services regularly get into trouble in countries where governments like to keep a solid grip on what people are talking about and with whom.No, not the US this time, Saudi Arabia is the latest to join the anti-Skype brigade as it threatens to ban essentially all VoIP communications in the country unless those communications...
undefined undefined

Twitter Hacked, 250,000 Email and Password Compromised

If you find that your Twitter password doesn't work the next time you try to login, you won't be alone. The service was busy resetting passwords and revoking cookies on Friday, following an online attack that may have leaked the account data of approximately 250,000 users."This week, we detected unusual access patterns...
undefined undefined

Advance DDOS Tools: Encrypted Layer Attacks and Server-Based Botnets

Application security solutions provider Radware has released its 2012 Global Application and Network Security Report. According to the study, distributed denial-of-service (DDOS) attacks are becoming more sophisticated and more severe.In addition, cybercriminals have started deploying new attack tools, such as server-based...
undefined undefined

Foxit Reader Vulnerable to Critical Remote Code Execution Flaw

Foxit Reader, a PDF viewer application often used as an alternative to the more popular Adobe Reader, contains a critical vulnerability in its browser plug-in component that can be exploited by attackers to execute arbitrary code on computers.Details about the vulnerability and how it can be exploited were publicly disclosed...
undefined undefined

Lithuanian Online Game Site Miestukarai Hacked, 24,000 Users Data Leaked

A hacker called AnonVoldemort claims to have gained access to the databases of Miestukarai.lt, a Lithuanian online game that appears to have almost 35,000 players.In the tweet announcing the hack, AnonVoldemort revealed that he had leaked over 24,000 accounts, both free and premium.The data has been removed since from...
undefined undefined

Hackers Steals 36,000 Individual Details from US Army Database

Earlier this month, unknown hackers managed to gain illegal access to the details of around 36,000 individuals who were somehow connected to the US Army command center formerly located at Fort Monmouth.According to APP, the details of Communications-Electronics Command (CECOM) and Command, Control, Communications, Computers,...
undefined undefined

XSS and Cookie Handling Vulnerabilities Identified on HTC Website, Allows Attacker to Hijack Account

16-year-old security researcher Thamatam Deepak has identified a number of three cross-site scripting (XSS) vulnerabilities and a cookie handling flaw on the website of world-renowned smartphone manufacturer HTC.The expert said the vulnerabilities – which affected pages such as product security, account information, and...
undefined undefined

Google begins scanning of Chrome Extensions & Stops Auto-Install

Google has taken two steps to prevent its Chrome browser becoming an attack vector for malware that runs as extensions to the browser.Like many other browsers, Chrome allows users to install “extensions”, apps that add functionality. Google even runs the “Chrome Web Store” to promote extensions.Security outfit Webroot...
undefined undefined

Default Configuration Flaw in W3 Total Cache Exposes Tens of Thousands of Sites

W3 Total Cache, which boasts high-traffic sites like Mashable and Lockergnome among its users, has serious vulnerabilities, according to this post on the Full Disclosure list.The default setup – that is, when users simply choose “add plugin” from the WordPress catalogue – left cache directory listings enabled, according...
undefined undefined

Kaspersky Anti-Virus & Internet Security 2013 Final + Key

Kaspersky Anti-Virus & Internet Security 2013 provides a wide range of technologies to protect your privacy and your identity – including two unique security features for entering personal information online.Secure Keyboard is a new Kaspersky technology that automatically activates whenever you open a bank website...
undefined undefined

New Set of Bugs discovered in MySQL

A series of posts on ExploitDB by an author signing as "King Cope" reveal a new set of MySQL vulnerabilities – along with one issue that could just be a configuration issue.The vulnerabilities, which emerged on Saturday, include a denial-of-service demonstration, a Windows remote root attack, two overrun attacks that work...
undefined undefined

How to Resolve Plagiarism Blog

Avoid Plagiarism - Disable copy paste on blogger - What should I do when my article being copied -- It feels really uncomfortable after many minutes even hours to write, suddenly came the thieves article. Casually and without guilt they copy-paste our articles to their blogs. I actually does not mind if I copy-paste...
undefined undefined

Russian hacker exploit Mac apps on OS X, Everything is Free

Last week Russian developer Alexey Borodin hacked Apple's In-App Purchase program for all devices running iOS 3.0 or later, allowing iPhone, iPad, and iPod touch users to circumvent the payment process and essentially steal in-app content. Apple today announced a temporary fix and that it would patch the holes with the...
undefined undefined

Apple’s in-app purchasing process circumvented by Russian hacker

Russian developer ZonD80 has figured out how to circumvent Apple's iOS In-App Purchase program, allowing iPhone, iPad, and iPod touch users to grab digital game items, upgrade to full versions of apps, and purchase additional content for free. As first spotted by Russian blog i-ekb, the video above shows an "in-app proxy"...
undefined undefined

Hackers expose 453,000 login data allegedly taken from Yahoo service

Hackers posted what appear to be login credentials for more than 453,000 user accounts that they said they retrieved in plaintext from an unidentified service on Yahoo.The dump, posted on a public website by a hacking collective known as D33Ds Company, said it penetrated the Yahoo subdomain using what's known as a union-based...
undefined undefined

How To Protect Yourself From DNSChanger

In July the Internet Systems Consortium will permanently shut down DNS servers deployed to serve as temporary surrogates for rogue DNS servers shut down as part of Operation Ghost Click, an FBI operation that brought down an Estonian hacker ring last year. If your PC is one of the more than 1 million computers infected...
undefined undefined

Keeping Data Safe on the Internet

Keeping Data Safe on the Internet - An owner of a small shed blood, sweat, tears perhaps even to build their businesses. For some, they've had dreams of $ 20is comes with sacrifice. However, how many ever stop and think about the fact that more terrible than business ownership?Of a number of studies, only a few employers...
undefined undefined

Anonymous Launches a DDOS Attack on Internet's root DNS Server

Summary: The Anonymous hacktivist movement is planning to launch a distributed denial of service attack (DDoS) on the Internet’s root DNS servers, using a Reflective DNS Amplification DDoS tool.According to a note left by members of the Anonymous hacktivist movement on Pastebin.com, the group is planning to launch a distributed...