Brian Prince

Researchers to Demonstrate Database Man-in-the-Middle Attacks at Black Hat

Two researchers from Trustwave will demonstrate how a man-in-the-middle attack on Oracle databases can be leveraged to swipe user credentials and hijack sessions at the upcoming Black Hat Europe security conference. Armed with a new proof-of-concept tool, Trustwave Director of Security Research Steve Ocepek and Security Consultant Wendel Henrique will demonstrate how attackers can steal […]

Arkansas Mom Charged After ‘Hacking’ Son’s Facebook Account

An Arkansas mother has been charged with harassment for accessing her 16-year-old son’s Facebook account and posting messages. The mother, Denise New of Arkadelphia, was hit with the misdemeanor charge March 26, after her son, Lane, filed a complaint with the Clark County Prosecutor’s Office. According to reports, the younger New accused his mom of […]

Adobe to Enable Silent Updates for Reader, Acrobat

Adobe Systems is enabling a silent updating feature in two products in an effort to ensure that users are running the most secure versions of the company’s software. With the new updater, Windows users can configure Adobe Reader and Acrobat to automatically download updates without user interaction. Right now, users have the choice of handling […]

Microsoft Preps 11 Security Bulletins for Patch Tuesday – 1

Microsoft is planning a significant Patch Tuesday update April 13 to address 25 vulnerabilities across Windows, Microsoft Office and Microsoft Exchange. In its pre-patch advisory April 8, Microsoft said there would be a total of 11 security bulletins issued. Five of the 11 are rated critical and affect Windows. Of the remaining six, all but […]

Oracle to Answer Questions on MySQL, but Will It Be Enough?

Oracle officials know they have some questions to answer about the road map for MySQL, and they plan to use the O’Reilly MySQL Conference & Expo next week to do it. At the conference, which will be held from April 12 to 15 in Santa Clara, Calif., Oracle Chief Corporate Architect Edward Screven is expected […]

Adobe Recommends Mitigations for PDF Security Attack

Adobe Systems is recommending that concerned users reconfigure the settings in Adobe Reader to thwart an attack that allows embedded executables in PDF files to launch. The situation was uncovered by security researcher Didier Stevens, who developed a proof-of-concept demonstrating how an attack could leverage launch action functionality in PDF viewing software to run embedded […]

Romanian Police, FBI Bust 70 in eBay Fraud Case

Law enforcement officials from Romania and the United States arrested 70 members of three different organized crime groups for their roles in an online scam targeting eBay. The arrests came in a series of raids by the Romanian Directorate for Investigation of Organized Crime and Terrorism that took place Sunday at more than 100 locations. […]

Survey: Many Federal IT Pros Skeptical of U.S. Security Readiness

The majority of federal IT decision makers in the national defense and security department agencies aren’t expecting many changes from the newly named cyber-security coordinator. That’s according to a survey of 201 IT pros commissioned by Lumension. The survey, conducted last month by Clarus Research Group, found that more than half “expect only minor policy […]

Vietnam Rejects Google Cyber-attack Charges

The Vietnamese government rebuffed charges by Google that Vietnamese PC owners were being targeted by attackers. The comments, posted online Saturday, were in response to a blog post by a member of Google’s security team outlining a malware attack. According to Google’s Neel Mehta, the infected computers were used to build a botnet that launched […]

Detecting Malicious Insiders Before Data Breaches Damage Your Business

As intriguing as the idea of a mysterious cyber-criminal hacking his way into a corporate network sounds, the majority of data breaches are the work of insiders. An employee copies data to a USB device and leaves it in a cab; a contractor misplaces a CD with customer information-these are common causes of data breaches. […]