Keyword: computersecurity

Brevity: Headers | « Text »
  • Microsoft rescues XP users with emergency browser fix

    05/01/2014 10:50:49 AM PDT · by dayglored · 71 replies
    Reuters ^ | May 1, 2014 | Jim Finkle
    Microsoft is helping the estimated hundreds of millions of customers still running Windows XP, which it stopped supporting earlier this month, by providing an emergency update to fix a critical bug in its Internet Explorer browser. Microsoft Corp rushed to create the fix after learning of the bug in the operating system over the weekend when cybersecurity firm FireEye Inc warned that a sophisticated group of hackers had exploited the bug to launch attacks in a campaign dubbed "Operation Clandestine Fox. ...
  • Stop using Microsoft's IE browser until bug is fixed, US and UK warn

    04/28/2014 6:24:40 PM PDT · by markomalley · 52 replies
    CNET ^ | 4/28/2014 | Seth Rosenblatt
    It's not often that the US or UK governments weigh in on the browser wars, but a new Internet Explorer vulnerability that affects all major versions of the browser from the past decade has forced it to raise an alarm: Stop using IE. The zero-day exploit, the term given to a previously unknown, unpatched flaw, allows attackers to install malware on your computer without your permission. That malware could be used to steal personal data, track online behavior, or gain control of the computer. Security firm FireEye, which discovered the bug, said that the flaw is being used with a...
  • Computer Security Software Opinion

    04/21/2014 7:05:52 AM PDT · by GYPSY286 · 31 replies
    None | April 21, 2014 | Gypsy286
    Favored Computer Security Software-What's the best and most economical?
  • Apple Says iOS, OSX and “Key Web Services” Not Affected by Heartbleed Security Flaw

    04/11/2014 5:58:05 PM PDT · by Swordmaker · 36 replies
    ReCode.net ^ | April 10, 2014, 1:42 PM PDT | By Mike Isaac
    Apple said Thursday that its mobile, desktop and Web services weren’t affected by a major flaw in a set of security software used by hundreds of thousands of websites. The flaw, codenamed “Heartbleed” and first reported by Web security firm Codenomicon, was discovered in a technology called “OpenSSL” — a set of encryption software used by Web companies to safeguard user information. Sites that use OpenSSL will display a small “lock” icon in the top left-hand corner of your Web browser’s address bar (though not all sites showing this lock use OpenSSL); the technology is used on more than two-thirds...
  • NSA Paid a Huge Security Firm $10 Million to Keep Encryption Weak

    12/20/2013 4:16:47 PM PST · by James C. Bennett · 99 replies
    Gizmodo ^ | 20 dec 2013 | Gizmodo
    Reuters reports that the NSA paid massive computer security firm RSA $10 million to promote a flawed encryption system so that the surveillance organization could wiggle its way around security. In other words, the NSA bribed the firm to leave the back door to computers all over the world open. Thanks to documents leaked by Edward Snowden, we already knew the NSA played a central role in promoting a flawed formula for generating random numbers, which if used in encryption, essentially gives the spies easy access to computing systems. A piece of RSA software, bSafe, became the most significant vector...
  • How The NSA Deploys Malware: An In-Depth Look at the New Revelations

    10/09/2013 10:34:00 AM PDT · by shego · 23 replies
    EFF ^ | 10/8/13 | Dan Auerbach
    We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a...
  • How to remain secure against NSA surveillance

    09/06/2013 4:15:48 AM PDT · by shego · 41 replies
    The Guardian ^ | 9/5/13 | Bruce Schneier
    Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.... At this point, I feel I can provide some advice for keeping secure against such an adversary.... 1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it's work for them.... 2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections--and it may have explicit exploits...
  • (Vanity) BEST free antivirus/security program?

    09/03/2013 1:08:21 PM PDT · by Doogle · 96 replies
    me | 09/03/13 | me
    Need to download a FREE program...need recommendations..
  • Zero Knowledge Proof may Answer Computer Security Question

    09/03/2013 9:35:49 AM PDT · by null and void · 39 replies
    Scientific Computing ^ | 08/28/2013 - 7:08pm | Bill Steele, Cornell University
    In the age of the Internet, it’s getting harder and harder to keep secrets. When you type in your password, there’s no telling who might be watching it go by. However, new research at Cornell may offer a pathway to more secure communications. The answer is to not send sensitive information at all. Rafael Pass, associate professor of computer science, has developed a new protocol, or set of rules, to create what computer scientists call a “zero knowledge proof.” “I think zero knowledge proofs are one of the most amazing notions in computer science,” Pass said. “What we have done...
  • Built-in backdoor: German govt warns of significant Windows 8 security danger

    08/25/2013 9:16:51 AM PDT · by opentalk · 7 replies
    RT.com ^ | August 23, 2013
    Leaked documents from the German Federal Office for Information Security (BSI) indicate that the organization has become suspicious of Trusted Platform Module (TPM) technology built into an increasing number of Windows 8 PCs and tablets. Documents uncovered and leaked by German news outlet Zeit Online found that the German Ministry of Economic Affairs was displaying significant unease with the combined technologies, suggesting the possibility that a backdoor could be created for further covert NSA surveillance operations. The backdoor in question would allow Microsoft to control the computer remotely. “Trusted Computing,” a method developed and promoted by the Trusted Computing Group,...
  • Provably Secure DNS: A Case Study in Reliable Software

    07/02/2013 7:14:11 AM PDT · by OneWingedShark · 16 replies
    http://ironsides.martincarlisle.com ^ | Unknown | Barry Fagin and Martin Carlisle
    Abstract. We describe the use of formal methods in the development of IRONSIDES, an implementation of DNS with superior performance to both BIND and Windows, the two most common DNS servers on the Internet. More importantly, unlike BIND and Windows, IRONSIDES is impervious to all single-packet denial of service attacks and all forms of remote code execution. Introduction DNS is a protocol essential to the proper functioning of the Internet. The two most common implementations of DNS are the free software version BIND and the implementations that come bundled with various versions of Windows. Unfortunately, despite their ubiquity and...
  • Seeking Surveillance Safe Search Engines

    06/17/2013 7:01:42 AM PDT · by ShadowAce · 10 replies
    FOSS Force ^ | 14 June 2013 | Christine Hall
    While helping our colleague Dave Bean as he worked to get his essay on Google and the NSA ready for publication, I found myself wondering if any of this latest news on the government’s forcing their nose into everybody-in-the-world’s business would have any lasting effect. Sadly, I figured not–if there was any change, it’d only be temporary. I’ve spent too many years on this planet to expect too much in the way of permanent change for the better. DuckDuckGo’s main page. Click to enlarge.Sadly, I’m of the generation that learned of the advent of global warming way back in the...
  • FBI: Hundreds Of Thousands May Lose Internet In July

    06/14/2013 9:45:51 AM PDT · by Bratch · 54 replies
    TeaParty.org ^ | April 21, 2012 | AP
    For computer users, a few mouse clicks could mean the difference between staying online and losing Internet connections this summer. Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down. The FBI is encouraging users to visit a website run by its security partner, http://www.dcwg.org , that will inform them whether they're...
  • The All-Seeing Eye

    06/14/2013 8:12:57 AM PDT · by giant sable · 30 replies
    Forbes.com ^ | June 14, 2013 | Michael S. Malone
    The other day, my college age son quietly went around the house and put electricians tape over the camera lenses on the displays of all our home computers.
  • Oracle -- Patches 42 security holes -- in Java

    04/17/2013 8:21:22 AM PDT · by Ernest_at_the_Beach · 26 replies
    Fudzilla ^ | Wednesday, 17 April 2013 09:33 | Nick Farrell
    Patches 42 security holes Oracle has released a major security update for the version of Java programming language that runs inside Web browsers. The patch fixes 42 vulnerabilities within Java, including "the vast majority" of those that have been rated as the most critical. Oracle Executive Vice President Hasan Rizvisaid that a series of big security flaws in the Java plug-in for browsers have been uncovered in the past year by researchers and hackers, and some have been used by criminal groups. One hacking campaign infected computers using Microsoft Windows and Apple software inside hundreds of companies.Earlier this year the US Department...
  • View Internet Porn, Get Blackmailed By Hackers (SYMC)

    11/11/2012 10:39:46 AM PST · by thecodont · 18 replies
    Business Insider via San Francisco Chronicle / SFGate.com ^ | Published 10:53 a.m., Friday, November 9, 2012 | Julie Bort, provided by BUISNESS INSIDER
    <p>Hackers have discovered a new way to part computer uses with their money. They plant malware on a computer that threatens to report the computer user to the police for viewing or distributing porn.</p> <p>It's a form of hacking called "ransomware," according to a new report by security company Symantec, which estimates hackers are earning upwards of $5 million a year from computer users who fall for the scam and pay the blackmail.</p>
  • Romney email scam infects computers (Beware and protect yourself!)

    10/13/2012 10:10:19 PM PDT · by Innovative · 12 replies
    FoxNews ^ | Oct 12, 2012 | Ben Weitzenkorn
    "CNN Breaking News -- Mitt Romney Almost President," reads the subject line of an email phishing scam aimed at political junkies. Inside the email is a collection of headlines that appear to link to CNN.com. But clicking through won't inform readers - instead, the links take users to a site that hosts the Blackhole Exploit kit code. Right now, the Blackhole Exploit kit accounts for 28 percent of all Internet threats, Sophos said. The kit can load a Java Trojan and relay which exploits exist on a victim's computer back to the BlackHole server. Hackers use trickery through malicious Web...
  • World IPv6 Launch Day: A Security Risk?

    06/06/2012 5:49:08 AM PDT · by ShadowAce · 11 replies
    eSecurity Planet ^ | 5 June 2012 | Sean Michael Kerner
    When World IPv6 Launch Day dawns on June 6th, IPv6 services will be enabled on thousands of sites around the world and left on. As the 32-bit IPv4 address space has been exhausted, there is a need for global carriers to move to the larger 128-bit address space that IPv6 provides. But will your organization be ready for the new security issues raised by IPv6? In an interview with eSecurity Planet, Chief Security Officer Danny McPherson of VeriSign cautioned that IPv6 is both an opportunity and a potential security risk. VeriSign is responsible for two of the 13 root DNS...
  • Google warns hundreds of thousands may lose Internet in July

    05/25/2012 9:25:10 AM PDT · by Berlin_Freeper · 21 replies
    FoxNews.com ^ | May 25, 2012 | FoxNews
    Google plans to warn more than half a million users of a computer infection that may knock their computers off the Internet this summer. Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system will be shut down July 9 -- killing connections for those people.
  • Fast-growing Flashback Botnet Includes Over 600,000 Macs, Malware Experts Say

    04/05/2012 5:45:29 AM PDT · by iowamark · 27 replies
    PCWorld ^ | Apr 5, 2012 | Lucian Constantin
    More than 600,000 Macs have been infected with a new version of the Flashback Trojan horse that's being installed on people's computers with the help of Java exploits, security researchers from Russian antivirus vendor Doctor Web said on Wednesday. Flashback is a family of Mac OS malware that appeared in September 2011. Older Flashback versions relied on social engineering tricks to infect computers, but the latest variants are distributed via Java exploits that don't require user interaction. On Tuesday, Apple released a Java update in order to address a critical vulnerability that's being exploited to infect Mac computers with the...
  • Chinese hackers took over NASA's Jet Propulsion Lab, Inspector General reveals

    03/01/2012 3:05:47 PM PST · by Doogle · 23 replies · 4+ views
    FOX ^ | 03/01/12 | FOXNEWS
    Chinese hackers gained control over NASA’s Jet Propulsion Laboratory (JPL) in November, which could have allowed them delete sensitive files, add user accounts to mission-critical systems, upload hacking tools, and more -- all at a central repository of U.S. space technology, according to a report released Wednesday afternoon by the Office of the Inspector General. That report revealed scant details of an ongoing investigation into the incident against the Pasadena, Calif., lab, noting only that cyberattacks against the JPL involved Chinese-based Internet Protocol (IP) addresses. Paul K. Martin, NASA’s inspector general, put his conclusions bluntly. “The attackers had full functional...
  • 5 ways to stay safe until 'do not track' button arrives

    02/24/2012 1:02:48 PM PST · by Ron C. · 19 replies · 1+ views
    FoxNews ^ | February 24, 2012 | Clayton Morris
    Google, Microsoft, AOL and other big companies have agreed to install a "do not track" button in Web browsers to make sure that you can surf the Web with an assured amount of privacy. It's a big step for the industry -- but until this button arrives, how can you assure yourself a little more privacy online? The "No Track" button would stop companies from using data about your Web browsing habits to customize ads for you. They have also agreed not to use the data for employment, credit, health-care or insurance purposes. For obvious reasons, that type of usage...
  • Anonymous Hacks Greek Ministry Website, Threatens It Will Wipe Away All Citizen Debts

    02/21/2012 5:05:39 PM PST · by dynachrome · 19 replies
    Zero Hedge ^ | 2-22-12 | Tyler Durden (Zero Hedge)
    If there is one war that Greece could not afford to join, that is with the global computer hacking collective known as Anonymous. Yet as of minutes ago, that is precisley what happened, after Anonymous, as part of what it now calls Operation Greece, took down the Greek Ministry of Justice (http://www.ministryofjustice.gr/). While the pretext for the hacking appears to have been an arrest of the wrong people, is seems to have angered Anonymous to the point where they have left an extended message of demands on the Greek website, warning that unless the IMF withdraws from the country and...
  • 'Anonymous' hackers threatens US power grid, official warn

    02/21/2012 9:09:24 AM PST · by Kartographer · 29 replies
    Fox News/WSJ ^ | 2/21/12
    The director of the National Security Agency warned that the hacking group Anonymous could have the ability within the next year or two to bring about a limited power outage in the US through a cyber attack. Gen. Keith Alexander, the agency's director, provided his assessment in meetings at the White House and in other private sessions, according to people familiar with the gatherings.
  • A simple HTML tag will crash 64-bit Windows 7

    12/21/2011 10:18:07 AM PST · by ShadowAce · 55 replies
    The Register ^ | John Leyden
    An unpatched critical flaw in 64-bit Windows 7 leaves computers vulnerable to a full 'blue screen of death' system crash. The memory corruption bug in x64 Win 7 could also allow malicious kernel-level code to be injected into machines, security alert biz Secunia warns. Fortunately the 32-bit version of Windows 7 is immune to the flaw, which has been pinned down to the win32k.sys operating system file - which contains the kernel portion of the Windows user interface and related infrastructure.Proof-of-concept code showing how to crash vulnerable Win 7 boxes has been leaked: the simple HTML script, when opened in...
  • Firefox Add-On Bypasses SOPA DNS Blocking

    12/21/2011 8:39:14 AM PST · by ShadowAce · 21 replies
    Torrent Freak ^ | 20 December 2011 | Ernesto
    The pending Stop Online Piracy Act (SOPA) continues to inspire opponents to come up with creative solutions to circumvent it. A new anti-SOPA add-on for Firefox, titled “DeSopa,” is such a counter measure.When installed, users can click a single button to resolve a blocked domain via foreign DNS servers, bypassing all domestic DNS blockades and allowing the user to browse the site though the bare IP-address (if supported). “I feel that the general public is not aware of the gravity of SOPA and Congress seems like they are about to cater to the special interests involved, to the detriment of...
  • I2P - Anonymity for the Masses

    11/15/2011 4:26:44 AM PST · by ShadowAce · 11 replies
    Linux Career ^ | 11 November 2011 | Jonathon Cox
    1. Introduction For many years people have wanted to protect their right to privacy. As technology changes, it seems that privacy evolves away more and more. I2P is a protocol used for an encrypted multi-proxy on the Internet. While, this sounds simple, there is actually a lot of work going on with I2P to achieve this. Unlike some multi-proxies, I2P will allow you to tunnel many more applications through it than just web browsing, making it a very robust protocol.I2P is available for all platforms, not just Linux. For this example I have used Debian Sid to perform the installation. With...
  • Feds: Cyber Criminals Hijacked 4 Million Computers

    11/10/2011 2:09:35 PM PST · by decimon · 8 replies
    ABC News ^ | November 9, 2011 | RICHARD ESPOSITO and LEE FERRAN
    > According to the indictment, the suspects entered into deals with various internet advertisers in which they would be paid for generating traffic to certain websites or advertisements. But instead of earning the money legitimately, the FBI said the defendants used malware to force infected computers to unwillingly visit the target sites or advertisements -- pumping up click results and, therefore, ill-gotten profits to the tune of $14 million. The malware was also designed to prevent users from installing anti-virus software that may have been able to free the infected computers. > In the first case, if a user searched...
  • The U.S. Drone Fleet Is Fully Infected By A Computer Virus

    10/07/2011 11:19:43 AM PDT · by PapaBear3625 · 115 replies · 1+ views
    Business Insider ^ | Oct 7, 2011 | Robert Johnson
    An unnamed computer virus is compromising the security of U.S. Reaper and Predator drones as they fly missions in Afghanistan, Iraq, Yemen, and Pakistan. Wired reports the virus was found about two weeks ago and hasn't kept the drone pilots at Creech Air Force Base in Nevada from conducting missions. There haven't been any reports of classified data breaches, but the virus has resisted the military's best efforts to remove it.
  • WTF: Microsoft praised by hacker for “spectacular” security approach

    08/08/2011 10:57:57 AM PDT · by for-q-clinton · 10 replies
    Venture Beat ^ | 5 Aug 2011 | Dean Takahashi
    Microsoft’s security used to be a joke. Its operating systems were riddled with bugs that were exploited by hackers and mocked at conferences such as Black Hat, the Las Vegas confab for security technology. But yesterday, one of the independent security researchers at the conference praised Microsoft’s progress on improving security. Chris Paget, chief hacker at security consulting firm Recursion Ventures, is a well-known figure at the twin Black Hat and Defcon conferences in Las Vegas, having demonstrated a live interception of a cell phone call last year. In her talk this year, she said she hated the limitations of...
  • N. Korea: `NK programmers hired in S.Korea to make security software`

    08/07/2011 5:52:15 PM PDT · by TigerLikesRooster · 5 replies
    Donga Ilbo ^ | 08/08/11
    `NK programmers hired in S.Korea to make security software` AUGUST 08, 2011 07:54 The CEO of a computer security company repeatedly looked around in an interview with a Dong-A Ilbo reporter. The executive seemed wary of whether somebody was listening to what he was saying. He started talking after placing on a table two mobile phones with different numbers. He showed nervousness in the interview, saying, “If what I say is leaked (to a third party)...” What the CEO was afraid of was none other than North Korea. He told Dong-A, “North Korean programmers are developing information security programs for...
  • Wireless drone sniffs Wi-Fi, Bluetooth, phone signals(war flying?)

    08/05/2011 7:25:52 PM PDT · by TigerLikesRooster · 12 replies
    CNET ^ | 08/04/11 | Declan McCullagh
    Wireless drone sniffs Wi-Fi, Bluetooth, phone signals By: Declan McCullagh August 4, 2011 11:19 AM PDT LAS VEGAS--Forget Wi-Fi war driving. Now it's war flying. A pair of security engineers showed up at the Black Hat security conference here to show off a prototype that can eavesdrop on Wi-Fi, phone, and Bluetooth signals: a retrofitted U.S. Army target drone, bristling with electronic gear and an array of antennas. "Nobody's really looking at this from a threat perspective," said Mike Tassey, a security consultant who works for the U.S. government intelligence community. "There's some pretty evil stuff you can do from...
  • Massive Global Cyberattack Targeting U.S., U.N. Discovered; Experts Blame China

    08/03/2011 6:25:02 AM PDT · by Freeport · 70 replies
    Fox News ^ | August 03, 2011 | N/A
    The world's most extensive case of cyber-espionage, including attacks on U.S. government and U.N. computers, is set to be revealed Wednesday by online security firm McAfee, and analysts are speculating that China is behind the attacks. The spying was dubbed "Operation Shady RAT," or "remote access tool" by McAfee -- and it led to a massive loss of information that poses a huge economic threat, wrote vice president of threat research Dmitri Alperovitch "What is happening to all this data — by now reaching petabytes as a whole — is still largely an open question," Alperovitch wrote on a blog detailing the threat. "However,...
  • What You Need to Know About the Internet Snooping Bill (and How You Can Protect Yourself)

    07/31/2011 4:38:42 PM PDT · by lbryce · 19 replies
    Lifehacker ^ | July 29, 2011 | Adam Dachis
    On Thursday, the US House of Representatives approved an internet snooping bill that requires internet service providers (ISPs) to keep records of customer activity for a year so police can review them as needed. Here's what this bill means for you and what you can do about it. What Is This Internet Snooping Bill, Exactly, and Why Is It Bad? The lovingly titled Protecting Children From Internet Pornographers Act of 2011 (PCFIPA of 2011) requires ISPs to retain customer names, addresses, phone numbers, credit card numbers, bank account numbers, and dynamic IP addresses. It's a record of your personal information...
  • House panel approves broadened ISP snooping bill

    Internet providers would be forced to keep logs of their customers' activities for one year--in case police want to review them in the future--under legislation that a U.S. House of Representatives committee approved today. The 19 to 10 vote represents a victory for conservative Republicans, who made data retention their first major technology initiative after last fall's elections, and the Justice Department officials who have quietly lobbied for the sweeping new requirements, a development first reported by CNET. A last-minute rewrite of the bill expands the information that commercial Internet providers are required to store to include customers' names, addresses,...
  • Every Move You Make, Every Click You Take, I’ll Be Watching You

    07/29/2011 3:27:47 PM PDT · by decimon · 33 replies
    Belmont Club ^ | July 29, 2011 | Richard Fernandez
    Boing-boing notices that “yesterday, the House Judiciary Committee voted 19-10 for H.R. 1981, a data-retention bill that will require your ISP to spy on everything you do online and save records of it for 12 months. California Rep Zoe Lofgren, one of the Democrats who opposed the bill, called it a ‘data bank of every digital act by every American’ that would ‘let us find out where every single American visited Web sites.’” The databank is “for the children”. HR 1981 is actually titled “Protecting Children From Internet Pornographers Act of 2011″. Its sponsors say “the Protecting Children from Internet...
  • 'Anonymous' Hackers Claim to Breach NATO Security

    07/21/2011 6:57:30 AM PDT · by markomalley · 6 replies
    AP/Fox News ^ | 7/21/11
    A group of computer hackers claims to have breached NATO security and accessed hordes of restricted material. The group called Anonymous says it would be "irresponsible" to publish most of the material it stole from NATO but that it is sitting on about 1 gigabyte of data. Anonymous posted a PDF file Thursday, and broadcast a link to it from its Twitter page, showing what appeared to be a document headed "NATO Restricted."
  • EXCLUSIVE: FBI Raids Homes of Suspected Anonymous Hackers

    07/19/2011 5:02:49 AM PDT · by Doogle · 5 replies · 1+ views
    FOX ^ | 07/19/11 | Jana Winter
    The FBI is executing search warrants at two Long Island, N.Y., homes and one Brooklyn, N.Y., home of three suspected members of notorious hacking group Anonymous early Tuesday morning, FoxNews.com has learned. More than 10 FBI agents arrived at the Baldwin, N.Y., home of Giordani Jordan with a search warrant for computers and computer-related accessories. The targets of the FBI searches are all in their late teens to early 20s.
  • Software designer says Casey Anthony prosecution data was wrong

    07/19/2011 6:27:00 PM PDT · by Clintonfatigued · 35 replies · 1+ views
    The Orlando Sentinal ^ | Jul 19, 2011 | Jeff Weiner
    Prosecutors cited a report prepared by a software program called CacheBack, which the state argued showed 84 web searches for chloroform being made on the Anthony computer. The defense would later contradict the CacheBack report with a separate report generated by another program, NetAnalysis. That report returned only one search result for chloroform. Last week, CacheBack CEO John Bradley posted a statement on his website, acknowledging that the 84-search result was an error, and criticizing the state for its use of flawed data. It was Bradley who introduced those results as a witness for the defense. On the stand, he...
  • A Cyber-Pearl Harbor On Horizon?

    07/15/2011 5:28:21 PM PDT · by Kaslin · 24 replies
    IBD Editorials ^ | July 15, 2011 | Staff
    Security: The Pentagon has disclosed perhaps the largest theft of sensitive data by an unnamed foreign government. The threat to our electronic infrastructure is real, growing and as dangerous as a North Korean missile. In outlining America's cyberwarfare strategy last Thursday at the National Defense University, Deputy Secretary of Defense William Lynn disclosed that 24,000 sensitive files containing Pentagon data at a defense company were accessed in a cyberattack in March, likely by a foreign government. He didn't disclose the identity of that government, but in a bit of an understatement he acknowledged, "We have a pretty good idea." So...
  • Hacked: Obama's campaign website

    07/06/2011 5:34:39 AM PDT · by markomalley · 12 replies
    Washington Examiner ^ | 7/5/11 | Hayley Peterson
    The Obama campaign website was hacked on Tuesday and invited supporters to two fake anti-government events hosted by an unnamed "Commy Obama."The campaign's application for mobile devices, such as iPhones and iPads, directed users to two events titled "Rules of Politics" scheduled for noon on Tuesday in Washington."1. Politicians and other public servants lie," read the event description provided on the Obama campaign website. (Full screenshot here.) "2. Politicians tell you what you want to hear and offer to provide things for 'free' to get votes. 3. When government buys, the people pay."The 430-word message lists 21 total anti-government criticisms,...
  • LulzSec Says Goodbye with New Data Dump

    06/27/2011 3:58:36 AM PDT · by Bad~Rodeo · 12 replies
    PC World ^ | June 26. 2011 | Ian Paul
    LulzSec the hacker group that has been a thorn in the side of major institutions ranging from Sony to the CIA, says it is going away -- but not quietly. The group said late Saturday it would disband. In what it says is its final act of mayhem, it publicly unloaded a trove of documents containing a significant amount of compressed data. "Our planned 50-day cruise has expired, and we must now sail into the distance...our crew of six wishes you a happy 2011," LulzSec says in its final message. . The group says it chose to end its campaign...
  • Japan to fine or jail computer virus creators

    06/17/2011 4:25:24 PM PDT · by decimon · 20 replies
    AFP ^ | June 17, 2011 | Unknown
    TOKYO (AFP) – Japan will punish people who create or wilfully spread computer viruses with fines and prison terms of up to three years under a new law enacted by parliament. Under the law, police can seize email communication logs of suspects from Internet service providers, among other information. The action, which has met with opposition from privacy and free speech advocates, brings Japan a step closer to concluding the Convention on Cybercrime, a Europe-led effort. The convention is the first international treaty to combat crimes committed via the Internet and other computer networks. Japan has signed the treaty but...
  • CIA, Senate hackers gleefully promise more

    06/16/2011 6:54:35 PM PDT · by bushwon · 7 replies · 1+ views
    CNN ^ | 6/16/11 | Doug Gross
    CNN) -- They've breached or busted the websites of the CIA, PBS and the U.S. Senate, and launched at least part of an extended attack on Sony, whose PlayStation Network was brought to a grinding halt for the better part of a month. And, to hear them tell it, it's all for a laugh. Meet Lulz Security, or LulzSec, the gleeful and secretive band of hackers who appear to be responsible for a string of high-profile and sometimes embarrassing Internet attacks. Their most recent strike, and arguably the most ambitious, was a distributed denial-of-service attack Wednesday that shut down the...
  • Computer security: Is this the start of cyberwarfare?Last year's Stuxnet virus attack...

    06/09/2011 8:30:52 PM PDT · by neverdem · 6 replies
    Nature News ^ | 8 June 2011 | Sharon Weinberger
    Last year's Stuxnet virus attack represented a new kind of threat to critical infrastructure. Just over a year ago, a computer in Iran started repeatedly rebooting itself, seemingly without reason. Suspecting some kind of malicious software (malware), analysts at VirusBlokAda, an antivirus-software company in Minsk, examined the misbehaving machine over the Internet, and soon found that they were right. Disturbingly so: the code they extracted from the Iranian machine proved to be a previously unknown computer virus of unprecedented size and complexity. On 17 June 2010, VirusBlokAda issued a worldwide alert that set off an international race to track down...
  • Wardrivers Target Seattle Businesses

    04/23/2011 7:22:31 AM PDT · by Clint Williams · 7 replies
    Slashdot ^ | 4/22/11 | timothy
    angry tapir writes "Seattle police are investigating a group of criminals who they say have been cruising around town in a black Mercedes stealing credit card data by tapping into wireless networks belonging to area businesses. The group has been at it for about five years, according to an affidavit signed by Detective Chris Hansen, a fraud investigator with the Seattle Police Department."
  • How many names and emails wre stolen recently from CC companies?(vanity)

    04/04/2011 4:50:54 PM PDT · by dynachrome · 31 replies
    me ^ | 4-4-11 | The young and studly Dynachrome
    I have received notification of email breaches from Kroger, Best Buy and Home Depot so far. They seem legit as they are not asking for any info, just notifying me of probable phishing scams based on these breaches. so how many credit cards got info stolen recently?
  • I don't believe this garbage

    03/29/2011 4:00:12 PM PDT · by FourtySeven · 98 replies
    Today | Self
    I thought I'd share this with you all, as some may benefit from this. Today, I was called by Wells-Fargo's fraud protection department to let me know my online ID and password had been compromised. Not only could they not tell me when exactly this occurred, or for what reason, but I was also told, I would have to run a full virus scan before they could restore my access. Now I could easily lie of course, although they make a point of saying that if an online scan truly was not performed, then they are not responsible for any...
  • Anonymous this week start Operation Empire State with release of damaging Bank Of America documents

    03/13/2011 3:43:08 AM PDT · by RonPaulPittsburgh · 142 replies
    uniteandstate ^ | March 13 | Ariellalight
    Most of us by now have heard about Anonymous. Anonymous has had its roots in various areas for a while now. Its primary targets tend to be a focused attempt at righting the wrongs of corporate monopolies and injustices that face the average person. Anonymous became a household known entity as it was exposed in its efforts to defend the operations of Wikileaks and Wikileaks founder Julian Assange. Their newest activities have revolved around shutting down various copyright agencies such as BMI as an attempt to fight back in the ongoing file sharing battle. A member of Anonymous who goes...
  • Wikileaks: How our Government IT Failed Us

    12/02/2010 7:53:27 PM PST · by gitmo · 9 replies
    ZDNet ^ | December 1, 2010 | Jason Perlow
    It wasn’t an insecure SIPRNet that created the “perfect storm” that allowed Private Bradley Manning to dump the State Department cables to Wikileaks. It was the failure of our government to apply standard IT practices in a theater of war. >== snip == So if SIPRNet is secure, and with the NetTop 2 environment it’s impossible to copy data off to a USB flash drive or a DVD from a secure session, how the heck was Manning able to dump that data to Wikileaks? == SNIP == But according to a Wired article from over the summer, we know...