Researchers at Trend Micro have spotted a Domain Name System-changing Trojan targeting Mac computers. Disguised as MacCinema Installer, the Trojan is detected by Trend Micro as OSX_JAHLAV.D and is considered to be an update to the OSX_JAHLAV.C malware identified in June. The malware poses as an Apple QuickTime Player update with the file name QuickTimeUpdate.dmg. […]
Microsoft is making the first community technology preview of SQL Server 2008 R2 generally available tomorrow. The new version of the flagship database – which MSDN and TechNet subscribers got their hands on Monday – has been enhanced with features around business intelligence and application and multiserver management. “This CTP provides the first opportunity to […]
Twitter’s servers were hit Aug. 11 with another distributed denial-of-service attack, sending the microblogging service crashing down. Around 3 p.m. EDT, Twitter posted an updated to its status blog stating that it was experiencing a site outage and was examining the nature of the attack. Later, Alex Payne, platform lead at Twitter, posted on a […]
Microsoft released nine security bulletins Aug. 11 for Patch Tuesday, swatting a number of critical bugs. All told, the bulletins address 19 vulnerabilities across Microsoft Windows, Microsoft Office, Visual Studio and other products. Among the vulnerabilities is a bug in Microsoft Office Web Components that has been exploited in the wild. According to Microsoft, the […]
Nine Security Acquisitions We Would Love to See Sophos thus far has not made any real move into SAAS (software as a service), bucking a trend of moves by McAfee, Symantec and Trend Micro. The strategy has paid off for Sophos, as the company’s on-premises business is going well. Still, as SAAS adoption continues to […]
Data leakage comes in all shapes and sizes. Just ask officials at Proofpoint. In the company’s sixth annual study (registration required) of outbound e-mail and data loss prevention issues, Proofpoint found that enterprises are increasingly faced with leaks due to the use of social networks and Web 2.0 technology. And they are not taking it […]
Afilias and Neustar are teaming with the Internet Systems Consortium to push support for the consortium’s DNSSEC Look-aside Validation registry. The consortium, commonly called ISC, created DLV to help domain holders secure their domain information. An extension to the DNSSECbis protocol, DLV is designed to aid early DNSSEC adoption by simplifying the configuration of recursive […]
Earlier this year, the SANS Institute teamed with a number of different vendors and organizations to list the 25 most dangerous programming errors. This time, it’s Fortify Software’s turn. But rather than focus on programming errors generally, the company examined several popular PHP projects – such as TikiWiki and phpMyAdmin – and compiled a list […]
The fallout from the distributed denial-of-service attack that hit several Web 2.0 sites Aug. 6 has taken a couple of twists and turns. Besides knocking out Twitter for a time on the Aug. 6, the attack triggered a response from the company that a day later disrupted service for some users. According to Twitter, its […]
Twitter is in the midst of defending itself against an ongoing denial-of-service attack, the micro-blogging service reported this morning. Few details have been released so far about the attack. The company, however, confirmed the attack today in a blog post, and noted that even though the site is back up, officials are still working to […]