Countries will continue to press the envelope to determine how much damage can be inflicted before the United States declares a cyberwar according to a Federal Bureau of Investigation (FBI) associate.
Hamish Barwick |
20 Jun |
Read more
Web scanning is different from vulnerability scanning because it looks for bugs in the Web apps themselves, rather than in the software installed on the Web server. For example, all of the vulnerability scanners told us about an old embedded system on our network vulnerable to a cross-site scripting attack because of an old version of PHP.
Joel Snyder |
20 Jun |
Read more
We developed a test methodology and evaluation criteria in six main areas, including results reporting, product controls and manageability, scan results, vulnerability workflow features, interoperability, and updates and protocol support.
Joel Snyder |
20 Jun |
Read more
Who has your private info? Who knows, given how common <a href="http://www.pcworld.com/businesscenter/article/229301/are_you_a_data_breach_victim_heres_what_to_do.html">security breaches</a> have become. And credit card information is one of the most common types of <a href="http://www.pcworld.com/article/227255/protect_your_data_from_the_breach_epidemic.html">personal data</a> we volunteer online. So what can you do to minimize credit card fraud? Well, you can't stop the break-ins, but here are four ways to keep your funds out of the hands of the bad guys.
Jeff Bertolucci |
19 Jun |
Read more
Amazon's Kindle e-reader store has a spam problem, and that isn't good news for legitimate authors and consumers trying to find their books.
Eric Mack |
20 Jun |
Read more
Literary website Writerspace.com has admitted that almost a quarter <a href="Literary website Writerspace.com has admitted that almost a quarter of the 62,000 email logins published after an attack by LulzSec came from its user database. ">of the 62,000 email logins published</a> after an attack by LulzSec came from its user database.
John E Dunn |
18 Jun |
Read more
A new U.S. military program shares classified information about <a href="http://www.networkworld.com/news/2011/061411-despite-years-of-talk-utilities.html?hpg1=bn">cyber threats</a> with defense contractors and their ISPs as part of a stepped up effort to blunt potential cyber attacks, a Department of Defense official announced on Thursday.
Tim Greene |
17 Jun |
Read more
Security firm Symantec is warning that more people may end up like Bitcoin user "Allinvain" and find their Bitcoin digital wallets pilfered by malicious hackers.
Ian Paul |
18 Jun |
Read more
Just three days after Microsoft patched 11 bugs in Internet Explorer (IE), hackers are exploiting one of those vulnerabilities, a security company said Friday.
Gregg Keizer |
18 Jun |
Read more
Hewlett-Packard Co. has become the latest to add its name to the rapidly growing list of high-profile corporate hacking victims.
Jaikumar Vijayan |
18 Jun |
Read more
Hacker collective or, as they put it, "those evil bastards from Twitter" LulzSec has issued an official statement attempting to explain its actions. You can read it <a href="http://pastebin.com/HZtH523f">here</a>.
Pete Davison |
18 Jun |
Read more
This week has seen a number of incidents related to hacking and the unauthorized access of information. In some cases, personal information has been compromised, in others, system administrators were able to take their networks down before anything was badly damaged. Following the recent PSN hack, which brought down Sony's systems for over a month and put many users' payment information and personal details at risk, the public eye is very much on hacker activity -- so here's a summary of what's been going on this week.
Pete Davison |
18 Jun |
Read more
Fresh from attacking the CIA's CIO.gov website with a denial of service (DOS) attack, hacker group LulzSec has struck again with a leaked list of 62,000 email addresses and passwords, including some harvested from Australian organisations.
Hamish Barwick |
17 Jun |
Read more
Malaysia's Communications and Multimedia Commission said that 51 websites in the .gov.my domain were attacked beginning late Wednesday, and that 41 of the sites suffered various levels of disruption.
John Ribeiro |
16 Jun |
Read more
Only hours after embarrassing the CIA by downing its website, hacking jokesters LulzSec have issued another self-declared indictment of the Internet's woeful security, leaking a database of 62,000 stolen passwords and user names.
John E Dunn |
17 Jun |
Read more
LulzSec has been making headlines on a virtually daily basis for a month or so now. The hacker group has compromised servers and exposed sensitive information from targets ranging from Sony, to PBS, to the FBI, and has even set up a hotline to take requests for which sites to attack next. The irony of the LulzSec hacks, though, is that the group is doing us all a favour whether they intend to, or not.
Tony Bradley |
17 Jun |
Read more
They say they're doing it for the "lulz," but there comes a point when it's no longer funny. The latest LulzSec targets are the CIA as well as 62,000 e-mail account holders using web-based services, including Comcast, Yahoo Mail, Hotmail, and Gmail.
Ed Oswald |
17 Jun |
Read more
The CIA's main public facing web site appears to have been taken down by hacking group LulzSec earlier today.
Jaikumar Vijayan |
16 Jun |
Read more
Five dollars for control over 1,000 compromised email accounts. Eight dollars for a distributed denial-of-service attack that takes down a website for an hour. And just a buck to solve 1,000 captchas.
Jon Brodkin |
16 Jun |
Read more
The Cold War between the USA and Russia may have ended two decades ago but a new frosty conflict between America and China together with North Korea has emerged on the digital frontier, according to McAfee’s US chief security officer.
Hamish Barwick |
15 Jun |
Read more