Entries by fdesir

WordPress blogs and more under global attack – check your passwords now!

An posting  from naked security about word-press   If you have a web service that supports remote users, you will know that malevolent login attempts are an everyday occurrence. Even on my own home-hosted SSH server, listening unassumingly on an IP number on a DSL line, I’ve seen thousands of login attempts from dozens of different IP numbers […]

Hacker pleads guilty to attacks on UK Police, Oxbridge university websites

A posting from Naked Security:  A 21-year-old British man has pleaded guilty to charges that he attempted to bring down a number of websites, including those belonging to Oxford and Cambridge universities, as well as the site belonging to the Kent Police force who ultimately arrested him. Lewys Stephen Martin was charged last November, following an investigation by […]

Microsoft security update may break Windows 7

an posting from NBC news in there Technology section: A security update that Microsoft pushed out earlier this week crashes some Windows 7, Windows Server 2008 and Windows Vista machines, forcing them into an endless cycle of reboots that can only be stopped by repairing the operating systems. Microsoft recommends that all Windows 7 users uninstall the security update. The update […]

Data broker Acxiom to reveal what it knows about you

An posting from Cnet news  in there Security and Privacy section: Acxiom, the company that tracks everything from your income to your politics, plans to introduce a service that will reveal what it knows about you, according to a new report. Consumer data broker Acxiom plans to introduce a service that will reveal to people what it knows about them, according to […]

Cybersecurity more of a priority in Obama budget

An posting from NBC NEW’s in there technology section:  WASHINGTON — President Barack Obama proposed on Wednesday increased spending to protect U.S. computer networks from Internet-based attacks in a sign that the government aims to put more resources into the emerging global cyber arms race. Obama’s budget proposal for the 2014 fiscal year, which begins Oct. 1, […]

Anatomy of an exploit – Linksys router remote password change hole

An interesting posting from Naked Security: A security researcher from San Jose in California has published a how-to guide detailing a number of vulnerabilities in various Linksys routers. Phil Purviance, who goes by the handle of SUPER.EVR (EVR stands for Exploitation Vulnerability Research), reported the holes privately on 05 March 2013:   And Purviance certainly lived up […]

Spamhaus DDoS Attacks: What Business Should Learn

An posting from Information week  in there security section: The distributed denial-of-service (DDoS) campaign aimed at anti-spam group Spamhaus over the past week, allegedly orchestrated by Stophaus.com, set the equivalent of a new land-speed record by reaching attack volumes that peaked at a whopping 300 Gbps.   Regardless of the mechanics of that attack — or whether it triggered widespread Internet access […]

Microsoft Windows 8 Security Software Lacks Teeth

An inserting posting from Information Week in there security  section: Not all Windows 8 endpoint security tools are created equal. That’s one takeaway from a recent study of Windows 8 antivirus products conducted by the independent German lab behind AV-Test, which reviews the effectiveness of endpoint security products. The firm found that out of nine corporate endpoint security products tested earlier […]

U.S. Air Force designates six cybertools as weapons

An posting Cnet new  from  there security and privacy section: Six cybertools have been designated as weapons by the U.S. Air Force, allowing the programs to better compete for increasingly scarce Pentagon funding, an Air Force official said on Monday. Lt. Gen. John Hyten, vice commander of Air Force Space Command, told a conference held in conjunction with the […]