COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Nov 03 06:35

Thanks for the memory

We read, all too often, of various government (and related) organizations losing huge files with plenty of VERY personal information in them.

Would it not be nice if the people involved did not have to carry these files around with them?

"Thanks for the memory

Sep 10th 2008
From Economist.com

A mathematical trick may allow people to scatter their computer files across the world's hard disks ...

...

Nov 02 11:09

Undetectable data-stealing trojan nabs 500,000 virtual wallets

Unlike many trojans, it doesn't rely on tricking the end user into clicking on a link or file to get installed. Rather, it spreads silently via websites that prey on unpatched vulnerabilities in the Windows operating system or in third-party applications, such as Adobe Flash and Apple's QuickTime media player.

"This particular trojan can get installed without even awareness of the end-user that they have agreed to anything or that anything has been installed," Sean Brady, manager of identity protection at RSA, said in an interview.

Nov 01 13:03

Trojan virus steals banking info

The details of about 500,000 online bank accounts and credit and debit cards have been stolen by a virus described as "one of the most advanced pieces of crimeware ever created".

The Sinowal trojan has been tracked by RSA, which helps to secure networks in Fortune 500 companies.

RSA said the trojan virus has infected computers all over the planet.

"The effect has been really global with over 2000 domains compromised," said Sean Brady of RSA's security division.

Nov 01 05:44

Anger about banking network security.

I'm interested in network security for online banking sites. It's a huge problem that seems to be being summarily ignored, and shirked for the responsibility it represents.

And there is a huge, gaping hole in the response for what could be done.

Here's the problem: we're all under attack 24/7. Anyone who has an online banking account is at risk.

Banks have done some things, and sometimes they change for improvement.

Oct 31 21:22

Long lines, glitches greet early voters

Four of the five computers that check voter registrations crashed Thursday night at the Adamsville Recreation Center in Atlanta, leaving more than a thousand people waiting long after the official closing time of 7 p.m. Hundreds were still in line at 11 p.m. as Atlantans watched them on the city’s late news broadcasts.

“This may be one of many places that this will happen,” said Lisa Borders, president of the Atlanta City Council. “The system is not adequate to accommodate the numbers of people that are going to be voting.”

Oct 28 17:24

Windows 7 Walkthrough, Boot Video and Impressions

Like Elvis in '68, Microsoft is itching for a "comeback," and Windows 7 is the perfect excuse. In fact, this week in LA at the Professional Developers Conference, Windows 7 officially shoved Vista aside. Having suffered through the often deserved criticisms of that ill-fated OS installment, Microsoft's people are thrilled to tears to be able to talk about something (anything!) else. On Sunday, they took journalists through a lively 7-hour orientation on Win 7, then handed off a Dell XPS M1330 loaded with pre-beta Build 6801.

Oct 26 09:36

New Worm Exploits Microsoft Bug

Only two days after Microsoft released the patch, security researchers identified a new worm named Gimmiv, which exploited the vulnerability in the RPC service.

Moreover, on Friday, a sample of the code hackers could use to further take advantage of the bug was posted on the Internet, on the Milw0rm.com hacker site.

Oct 25 09:00

Security Flaw Is Revealed in T-Mobile’s Google Phone

Just days after the T-Mobile G1 smartphone went on the market, a group of security researchers have found what they call a serious flaw in the Android software from Google that runs it.

One of the researchers, Charles A. Miller, notified Google of the flaw this week and said he was publicizing it now because he believed that cellphone users were not generally aware that increasingly sophisticated smartphones faced the same threats that plague Internet-connected personal computers.

Oct 24 17:27

Think Firefox 3 is fast? Try Firefox Minefield

A colleague today showed me a cool, new browser that he's been using to browse the web at blisteringly fast speeds. The browser? Minefield. The author of the code?

Mozilla.

Yes, that same Mozilla that makes the Firefox browser. Minefield is, in fact, a way to glimpse into the future of Firefox, as it's a pre-release/alpha version of the Firefox browser.

After spending some time with Minefield, one thing is clear: the future of Firefox is fast. Lightning fast.

Oct 24 09:06

Labor's web gag 'worse than Iran'

The Federal Government is attempting to silence critics of its controversial plan to censor the internet, which experts say will break the internet while doing little to stop people from accessing illegal material such as child pornography.

Internet providers and the government's own tests have found that presently available filters are not capable of adequately distinguishing between legal and illegal content and can degrade internet speeds by up to 86 per cent.

Oct 24 07:33

Time to patch Windows again, ASAP

If you use a Windows computer connected to a network, a newly discovered bug makes it possible for a bad guy to wreak havoc on the computer without your doing anything. The most vulnerable versions of Windows are XP, 2000 and Server 2003. Vista and Server 2008 are also vulnerable, but not as badly. Microsoft considers the bug important enough to issue the patch immediately rather than waiting for their normal once-a-month patch Tuesday.

Oct 19 22:39

World Bank Under Cyber Siege in 'Unprecedented Crisis'

The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.

Gosh, I wonder who?

Oct 19 22:36

What Really Happened University: Electronic Harassment

If someone uses any electronic device to aid them in invading your person or property for the purpose of gathering information illegally, or for the purpose of causing harm, this is Electronic Harassment.

Oct 14 18:29

McCain begs for YouTube takedown immunity

After having several campaign videos removed from YouTube for alleged copyright violations, Republican presidential candidate John McCain wants the video-sharing web site to consider special takedown privileges for politicians and their ilk.

McCain '08 general counsel Trevor Potter yesterday sent a letter to YouTube execs claiming the site is too quick to remove their campaign videos based on "overreaching copyright claims." He wrote that on numerous occasions that the material in question was "clearly" privileged under the US fair use doctrine.

Oct 13 09:18

Up to 1.7m people's data missing

A missing computer hard drive may have contained details of 1.7 million people who had enquired about joining the armed forces, the government has said.

The drive was reported missing last week by EDS, a firm contracted to the Ministry of Defence.

Armed Forces Minister Bob Ainsworth told MPs the information, which went missing at an EDS site in Hampshire, was "unlikely" to have been encrypted.

It is not known if the drive was lost or stolen. An investigation has begun.

Oct 11 09:09

Researchers: RFID Tags Can Transmit Computer Viruses

Cheap radio chips that are replacing the ubiquitous barcode are a threat to privacy and susceptible to computer viruses, scientists at a Dutch university said on Wednesday.

Researchers at Amsterdam's Free University created a radio frequency identity (RFID) chip infected with a virus to prove that RFID systems are vulnerable despite the extremely low memory capacity on the cheap chips.

Oct 10 19:32

Opera releases 9.6 web browser

Opera has released version 9.6 of its desktop browser, highlighting further speed and efficiency improvements plus a number of new features.

One of these, Opera Link, will save browser history and favourite search engines to ‘the cloud’, enabling users to access bookmarks and previously-visited sites from any computer. Meanwhile, Opera Mail offers a ‘low-bandwidth’ mode, designed for use on slow connections that will strip out attachments, unless specified. It will also let you choose to either follow or ignore contacts in a thread.

Oct 10 17:23

Sneaky OpenOffice 3 Download

OpenOffice is a free and open source productivity suite that is seen as an alternative to Microsoft Office. This latest version could be seen as a playful Microsoft Office 2003, missing some of its features but surpassing it in other areas. OpenOffice Writer (Microsoft Word equivalent) defaults to saving in its own format (.odt), but the setting can be changed to automatically save in the prevalent Word format (.doc). With this change, we believe most users wouldn’t even notice they were using OpenOffice 3 instead of Microsoft Office 2003 or below.

Oct 10 06:44

WiFi is no longer a viable secure connection

WiFi is no longer secure enough to protect wireless data.

Global Secure Systems has said that a Russian's firm's use of the latest NVidia graphics cards to accelerate WiFi ‘password recovery' times by up to an astonishing 10,000 per cent proves that WiFi's WPA and WPA2 encryption systems are no longer enough to protect wireless data.

Oct 10 06:38

Bank buyouts trigger new phishing scams

Security experts are warning users to be on the lookout for a new round of spam attacks playing off of the recent banking crisis.

The US Computer Emergency Response Team (US-Cert) highlighted new spam messages purporting to be from popular banks.

The warnings come after the recent economic crisis pushed several major banks into the hands of new owners.

The rash of buyouts left some consumers puzzled as to the company now operating their banks, and phishers have capitalised on this confusion.

Oct 10 06:30

Oops : Asus EEE Mini PC Box Contaminated With Recycled.exe Virus

Big Box manufacturer Asus has acknowledged that its EEE Box Desktop Mini PCs contain a virus called Recycled.exe which is hidden in the box's 80GB hard disk drive.

While Asus says that it only affects computers shipped in Japan, the Register understands that EEE Boxes in Europe and elsewhere could also be at risk.

The Windows-only malware is activated once the D: drive is accessed and it will try to infect all fixed and removable drives. What's more, The Register found another password-sniffing Worm loaded on their review EEE PC box - definitely not a good sign.

Oct 10 06:27

Messages from Earth sent to distant planet by Bebo

Messages from Earth – including a photo of George W Bush chosen to illustrate evil - have been sent to a distant planet that could be home to intelligent life.

Oct 08 19:33

750,000 lost jobs? The dodgy digits behind the war on piracy

If you pay any attention to the endless debates over intellectual property policy in the United States, you'll hear two numbers invoked over and over again, like the stuttering chorus of some Philip Glass opera: 750,000 and $200 to $250 billion. The first is the number of U.S. jobs supposedly lost to intellectual property theft; the second is the annual dollar cost of IP infringement to the U.S. economy. These statistics are brandished like a talisman each time Congress is asked to step up enforcement to protect the ever-beleaguered U.S. content industry.

Oct 07 06:41

Vista R.I.P.

Vista is awful. Everyone knows it, including Microsoft, and now Microsoft's actions have made it clear that Vista is on its way to the Microsoft junkyard with such similar failures as Windows ME and Microsoft Bob.

You don't have to believe me. Just look at what Microsoft has been doing. First, Microsoft started fast-tracking Vista's successor, Windows 7. Recently, we discovered that Windows 7 alpha will be coming to developers this October.

Oct 06 09:38

How to create the ultimate encrypted flash drive

To create your own ultimate encrypted flash drive, here is what you’ll need to do. Keep in mind, this procedure has been done with the latest 6.0a version of TrueCrypt.

Oct 06 06:57

Windows XP: the invincible OS

Good news for consumers and business customers alike who would not touch Vista with a slow-running barge pole, bad news for Microsoft which is already touting the wonders of Windows 7. XP simply refuses to die, and Microsoft appears unable or unwilling to turn off the life support…

Oct 06 06:13

T-Mobile Loses Data Of 17 million Customers But No Bank Details

In a startling revelation T-Mobile has admitted that it lost records of nearly 17 million German customers which contained their personal details including email addresses and phone numbers.

In a statement T Mobile's parent, Deutsche Telekom mentioned that a storage device that contained these files has landed in the hands of unknown parties.

Reports indicate that the records of German customers which were lost in 2006 possibly included secret addresses of politicians and some celebrities; however the fact that no bank details were present comes as a saving grace.

Oct 03 02:30

How a Canadian cracked the Great Firewall of China

When Nart Villeneuve couldn't remember the password to his Chinese MySpace page, the industrious Canadian hacker began examining China's version of Skype, and in the process, unlocked the inner workings of an Internet surveillance network tracking thousands of political activists in the world's most populous nation.

Oct 02 15:15

A Look at the ‘Clickjacking’ Web Attack and Why You Should Worry

There’s a nasty new security threat making waves on the web. Actually, clickjacking, as this attack is known, isn’t entirely new, but because no one has yet come up with an effective solution, it remains a serious threat. And clickjacking is the worst sort of security risk — it’s transparent to the unwitting user, simple to implement and difficult to stop.

Sep 30 18:49

Four top sites vulnerable to attack, warn researchers

Four leading websites were or are vulnerable to attack through an underrated vulnerability, according to Princeton University researchers.

While ING Direct, YouTube and Metafilter have taken action to address the cross-site-request-forgery (CSRF) vulnerabilities, the fourth site, belonging to The New York Times, has not been fixed, the researchers claimed in a blog post.

Sep 30 16:10

Toxic Mac Pro’s emitting benzene?

Mac Pro owners, listen up.

A french newspaper Liberation.fr has published a report (English translation) stating that Mac Pro owners run the risk of getting diseases as dangerous as leukemia (blood cancer) simply by using their computer. The newspaper was warned by a national agency scientist that the smell (already detected by many Mac Pro users on Apple forums) is actually toxic, composed of several toxins, including benzene.

Sep 30 06:03

Yahoo Mail Security Flaw Exposes Passwords

A hacker working on a way to access Yahoo Mail via IMAP, recently discovered that Yahoo’s desktop e-mail client is sending your password as plain text. That’s bad news for those of you using the desktop client over public wifi connections, where just about anyone with the know-how can see your unencrypted traffic.

Sep 29 16:16

Adobe's CS4 pricing is completely bananas

IF YOU WERE THINKING about popping along to your local computer superstore to pick up a copy of Adobe's Creative Suite 4 Master Collection on its release date of November 14th, you might just want to reconsider.

Because Adobe's insane pricing policy means that it would be cheaper to fly from London to New York, grab a copy of the software, spend the night in a hotel, and fly back to London the next day!

Sep 23 16:27

Fake popup study sadly confirms most users are idiots

For most of us, security issues happen to "other people"—we block popup ads, we carefully examine dialog boxes and, for those of us on the Mac platform, we snicker when confronted with something that attempts to mimic a Windows system warning. But everyone knows that they are exceptional—what's the behavior of a more typical user like? Some researchers have tested how college students respond to fake dialog boxes in browser popup windows and found that the students are so anxious to get the dialog out of the way, they click right through obvious warning signs.

Sep 23 05:57

Hunt for Palin hacker shaping up to be simple case

WASHINGTON - The hunt for the hacker who broke into Republican vice presidential candidate Sarah Palin's personal e-mail account is shaping up to be a remarkably simple investigation, by the standards of major cybersecurity whodunits.

U.S. investigators figure the hacker claimed responsibility in a detailed accounting that included his own personal e-mail address and that he tried to cover his trail using a U.S. Internet anonymity service that has been surprisingly cooperative with the FBI in efforts to peel away that anonymity.

Sep 22 19:40

Customs Officials Arrest 14 Year Pirate

I didn’t grow up in a ‘lock up pirates and throw away the key’ environment yet i’m still disturbed and concerned at how copyright enforcement is heading. Going to war against today’s potential customers seems foolish. Punishing and polarizing children - tomorrow’s customers - at the behest of big-business, is in a completely different league.

Sep 22 19:36

8 hacks to make Firefox ridiculously fast

Firefox has been outperforming IE in every department for years, and version 3 is speedier than ever.

But tweak the right settings and you could make it faster still, more than doubling your speed in some situations, all for about five minutes work and for the cost of precisely nothing at all. Here's what you need to do.

Sep 21 17:10

FBI eGuardian System

Sep 17 05:56

Encrypt Your Mobile and Land Line Conversations

SecVoice Secure Phone software allows your Microsoft smart phone or pocketpc to make secure cellular and landline calls.

Sep 15 09:01

Iphone tracks your every move

YOUR IPHONE IS WATCHING every move you make and the Cupertino Cabal knows all about it according to Wired.

Insecurity expert Jonathan Zdziarski has found that the phone takes a temporary snapshot of pretty much everything you ever do on your touchy-feely phone.

It's all in the name of aesthetics, says Apple. The sneaky screen grab is used to make the swooshy genie effect, which sweeps your current page off of the screen in a very pretty manner, whenever you hit the 'home' button.

Sep 14 16:34

Our Data, Ourselves

In the information age, we all have a data shadow.

We leave data everywhere we go. It's not just our bank accounts and stock portfolios, or our itemized bills, listing every credit card purchase and telephone call we make. It's automatic road-toll collection systems, supermarket affinity cards, ATMs and so on.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA