Blogs | Page 13
Google Chrome Update Swats 16 Security Bugs
By Brian Prince | Posted: 2011-01-13
Google plugged 16 security holes in the latest release of Chrome, including one that netted the top prize in Google's bug rewards program.
Of the 16, 13 were classified as "high"
... Read More
... Read More
'Anonymous' Hits Fine Gael Website
By Brian Prince | Posted: 2011-01-10
The loosely-affiliated cyber-group 'Anonymous' has been tied to the compromise of the Fine Gael Website, according to reports.
The attack took place Jan. 9, and compromised some 2,000 of user
... Read More
... Read More
One-third of Malware Created in 2010, Panda Security Reports
By Brian Prince | Posted: 2011-01-06
Malware writers had a busy year in 2010.
According to Panda Security, during the year, cyber-criminals created and distributed more than one-third of all existing malware ever
... Read More
... Read More
Fake Windows Update Conceals Malware
By Brian Prince | Posted: 2011-01-05
Sophos has detected a new AutoRun worm spreading under the guise of being an update for Microsoft Windows.
It is an old ploy, but apparently one effective enough for attackers to keep
... Read More
... Read More
BitTorrent Can Be Exploited as a DDOS Tool
By Fahmida Y. Rashid | Posted: 2011-01-04
Launching a distributed denial of service attacks used to be hard. Attackers had to first compromise computers and create zombies before hitting the GO button. With Anonymous offering a
... Read More
... Read More
Mozilla Accidentally Publishes Usernames and Passwords
By Fahmida Y. Rashid | Posted: 2010-12-28
Another day, another set of usernames published "by accident."
This time, it's by Mozilla, the developer of popular open source software including Firefox and Thunderbird. A
... Read More
... Read More
Microsoft Issues Advisory on IE Zero-Day
By Brian Prince | Posted: 2010-12-22
Microsoft released an advisory today to address a zero-day vulnerability affecting Internet Explorer.
Microsoft decided to release the advisory after exploit code for the unpatched bug
... Read More
... Read More
URL Shortener Is Also A DDOS Tool
By Fahmida Y. Rashid | Posted: 2010-12-22
Despite security researchers citing the dangers of using URL shorteners, they've proliferated online. Twitter pretty much requires them because of its 140-character limit, and major sites like
... Read More
... Read More
Spammers Sending WikiLeaks Spam
By Fahmida Y. Rashid | Posted: 2010-12-22
Spammers and other cyber-scammers often cash in on breaking news and topical information to trick users into downloading malware or clicking on suspicious links. The latest scam targets people
... Read More
... Read More
HP Issues Security Patch for Storage Mirroring Software
By Brian Prince | Posted: 2010-12-21
Hewlett-Packard (HP) released a patch Dec. 20 to cover a remote code execution vulnerability in its StorageWorks Storage Mirroring software.
The software is used to provide
... Read More
... Read More
Database Security Reminder: Don't Let Down Your Guard
By Brian Prince | Posted: 2010-12-18
Compromises can happen quickly - a fact the folks at Sentrigo were recently reminded of when attackers came knocking on their digital door.
On Dec. 1, the company deployed an instance of the Oracle database running on Amazon EC2. Six days later, it was pwned. Fortunately, no production data was
Attackers Exploiting Exim Bugs with Rootkit
By Fahmida Y. Rashid | Posted: 2010-12-17
Attackers are already exploiting a bug in the Exim mailer to remotely execute code on compromised Linux machines, according to a pair of Linux security advisories.
Posted on US-Cert as
... Read More
... Read More
Mozilla Expands Bug Rewards Program
By Brian Prince | Posted: 2010-12-15
Mozilla has expanded its bug rewards program to include security vulnerabilities discovered on its Websites.
"Many people are not aware that we have paid a bounty in the past on web application
... Read More
... Read More
'Anonymous' Hackers Take the Battle to Fax Machines
By Brian Prince | Posted: 2010-12-14
"Operation Payback" is taking a new twist, as attackers have begun a new fax-based campaign against some of the companies that cut ties with WikiLeaks.
Hacktivists with
... Read More
... Read More
Linux Kernel Exploit Goes Public
By Brian Prince | Posted: 2010-12-08
A security researcher has posted an exploit for the Linux on the Full Disclosure mailing list that utilizes three different bugs to permit an attacker to get root access.
The exploit was posted by Dan Rosenberg, and affects Linux kernel version 2.6.37. The bugs he used were reported by researcher Nelson







