Brian Prince

Adobe Flash Security on Menu at Black Hat

Security vulnerabilities in Adobe Systems’ applications have increasingly become a popular target for attackers in the past year. At Black Hat DC, Foreground Security Senior Security Researcher Mike Bailey will examine Flash’s security model and take a look at some of the ways attackers can leverage Adobe Flash vulnerabilities to compromise a system. “This is […]

Black Hat SEO Campaign Targets iPad

As always, attackers are hard at work on the black hat SEO front. Today’s target is the Apple iPad. Search engine optimization poisoning is being used to rope users entering keywords such as “Apple Tablet” and “Apple iPad rumor” into downloading rogue security software. According to Symantec, the terms lead users to results from malicious […]

Critical Infrastructure Security a Mixed Bag, Report Finds

A new report from the Center for Strategic and International Studies highlights the financial damage of cyber-attacks on critical infrastructure, but also paints a picture of IT security that is in turns good and bad. The report, “In the Crossfire: Critical Infrastructure in the Age of Cyberwar” (PDF), was commissioned by McAfee and includes information […]

Apple iPhone App Security in Spotlight at Black Hat

A software engineer is highlighting the challenges facing mobile application stores in an upcoming presentation at Black Hat DC. In his presentation Feb. 3, software engineer Nicolas Seriot will focus on applications for the Apple iPhone, and how Apple’s guarantees of privacy and applications can fall short at the App Store’s virtual door. “In late […]

Nebraska Man Admits DDoS Attack on Church of Scientology

A Nebraska man agreed this week to plead guilty in connection with attacks on Web sites for the Churchof Scientology, becoming the second person to do so since the investigation began. Brian Thomas Mettenbrink of Grand Island, Neb., will plead guilty to the misdemeanor charge of unauthorized access of a protected computer. Under the deal, […]

Google Chrome 4 Bolsters Browser Security with New Features

Google has beefed up the latest version of its Chrome browser with new security protections designed to help developers build secure Websites. In Chrome 4, which was released Jan. 25, Google added three new security features: strict transport security, cross-origin communication with postMessage and reflective cross-site scripting (XSS) protection. Strict transport security requires a browser […]

Symantec’s Consumer Business Led Way in Q3

Symantec reported $1.551 billion in revenues in the third quarter of fiscal 2010, due in part to growth in its consumer business. The company reported GAAP net income of $300 million for the quarter, compared with a $6.82 billion loss for the same quarter the previous year. About 31 percent of the revenues came from […]

How Will Oracle Ownership of MySQL Affect IBM, Microsoft?

As Oracle lays out its integration plans for newly acquired Sun Microsystems, the two rivals it has most obviously affected in the database space are IBM and Microsoft. The acquisition of Sun brings with it MySQL, a database that has grown in popularity during recent years, particularly for businesses focused on Web 2.0. With the […]

Possible Worm Prank No Laughing Matter

Some pranks just aren’t funny. Today, we find our case in point in a new Windows worm that has spread from Slovakia to computers around the world. According to ESET, it is widely believed Win32/Zimuse A and Win32 Zimuse B started as a prank to infect the fans of a motorcycle club in the central […]

IT Security Spending Expected to Increase for Enterprises, SMBs

Two new reports from Forrester Research project that roughly 40 percent of enterprises and small and midsize businesses plan to increase their IT security budgets in 2010. The reports, released Jan. 25, found other commonalities: A large percentage of both groups expect spending on network security to increase and have declared data security “critical.” According […]