Grand jury indicts two Europeans over denial-of-service attacks in 2003 A federal grand jury has indicted two European men for allegedly orchestrating denial-of-service attacks against a pair of U.S.-based Web sites in 2003. Read more...
Lawyers want Windows Update used to push 'Vista Capable' lawsuit notices
Vendors rush to fix bug that could crash Internet systems
Researcher finds evidence of massive site compromise
Digs up cache of 200,000 site credentials for Fortune 500 firms, weapons makers, governments
CSRF Flaws Found on Major Websites - 9/29/2008 5:35:00 PM Princeton University researchers reveal four sites with cross-site request forgery flaws and unveil tools to protect against these attacks
California makes it a crime to 'skim' RFID tags
Sysadmin admits stealing computers, office equipment from Navy
California outlaws RFID card skimming
Chinese Skype spies on users, researcher says
Frustrated researcher details iPhone security bugs
Many computer users lack basic security precautions, survey says
How to Root Out Bots in Your Network - 10/2/2008 5:40:00 PM
Expert gives tips on how to detect and remediate internal botnet infestations
Why Risk Management Doesn't Work - 10/2/2008 3:45:00 PM
Two new studies challenge current wisdom about calculating an enterprise's security risk -- and recommend rethinking the process
House.gov Still Plagued by E-mail Deluge
A glut of e-mail from constituents and special interest groups continued to pose problems for the Web sites for members of the U.S. House of Representatives on Thursday, as millions of Americans attempt to voice their opinions on the financial bailout package the day before an expected vote on the measure.
Second bill tackles laptop border searchesNews Brief, 2008-10-02
Three U.S. lawmakers propose a law to limit the searches of laptops or other electronic devices to cases where customs agents have reasonable suspicion of illegal activity.
Credit card processors finally get clue, will ban WEP
Credit card processors have finally realized what security experts have known since 2001: WEP is next to worthless as a wireless security protocol, and they're finally going its use in credit card processing systems—but not until mid-2010. The use of WEP was a major factor in the largest consumer data theft ever.
October 03, 2008 - 11:45AM CT - by Jacqui Cheng
Livefilestore URLs used in spamOctober 1, 2008
Spammers are using files hosted on livefilestore.com to redirect users to suspect web pages.
Judge Won't Allow Researchers To Reveal Report On E-Voting Machines
Artemis Backstage #1: Malware Mapping
News about the Artemis project has been out for a little while. As the rollout continues we want to post some of juicy backstage gossip here, making you some of the first people to see this outside of the core project team!
If you’ve not heard about the Artemis technology yet, it’s our “in-the-cloud”-based malware detection; head over to the McAfee Artemis micro-site. I highly recommend the podcast (hidden on the right-hand side) as my colleague Dimitry Gryaznov outtalks our communications guru Dave Marcus.
One of the things Artemis provides to researchers is very clear telemetry on active malware campaigns, and I want to share a few interesting examples. All the “measles maps” below show a one-day period and were all taken at the same time earlier today.
Cybergang moles steal company data
Dan Raywood October 02, 2008
Criminal gangs have been placing staff members in companies to operate as moles, an internet security expert said.
Wireless at Fiber Speeds
By Kate GreeneFriday, October 03, 2008
New millimeter-wave technology sends data at 10 gigabits per second.
Hijacking Satellite Navigation
By Erica NaoneThursday, October 02, 2008
Sending false signals to GPS receivers could disrupt critical infrastructure.
Report: Adware supplies one third of all malwareCNET - Thu Oct 2, 7:57 PM ET
On Thursday, Panda Security released its report for the third quarter stating that adware is responsible for one third of all new malicious software. In particular, the security company cited increased use of fake antivirus scanners.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment