Twitter Mouse-Over Flaw Send Users to Dangerous Links
/
0 Comments
Earlier in the day a security flaw turned Twitter's Website into a chaotic and potentially unsafe place, filled with annoying pop-up windows that activated just by rolling the mouse over another user's tweets.
FCC to make ruling on “White Space” usage.
On September 23rd the FCC will vote on a new set of rules that will finally allow their planned “super WiFi” to become reality.
In 2009 the FCC voted to open up the vast amounts of “white space” frequencies that lie between television broadcast channels.
The EnCase Evidence File Format
The EnCase evidence file can also be referred to as a forensic…
Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard
ulnerability Assessment, according to wikipedia.org, is the process of
identifying and quantifying vulnerabilities in a system. Vulnerability assessment
can be used against many different types of systems such as a home security
alarm, the protection of a nuclear power plant or a military outpost. Note that
vulnerability assessment is different from risk assessments even though they share
some of the same commonalities. Vulnerability Assessment concerns itself with
the identification of vulnerabilities, the possibilities of reducing those
vulnerabilities and improving the capacity to manage future incidents. This paper
will focus primarily on vulnerability assessment as it pertains to information
technology infrastructure and how utilizing QualysGuard can ease the burden on
your technology staff.
‘Here You Have’ Worm Runs Wild Hitting U.S. Organizations Hard
Last week a hacker named, "Iraq resistance" who has been trying to unite other like-minded hackers in a cyber jihad effort towards US initiated a malicious computer worm know as the "Here you have" worm. A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention.
Microsoft Security Bulletin Summary for September 2010 – Issued: September 14, 2010
With the release of the bulletins for September 2010, this bulletin
summary replaces the bulletin advance notification originally issued
on September 9, 2010. For more information about the bulletin
advance notification service, see
http://www.microsoft.com/technet/security/Bulletin/advance.mspx.
Adobe Zero-Day Strikes Again
For the second time in nearly a week, Adobe Systems is warning users about a zero-day vulnerability under attack.
Spammers Stay Busy Despite Pushdo Botnet Hit
From the shutdown of McColo to last week's disruption of the Pushdo botnet, spammers have continually found ways to stay in business.
Nearly 20 of the 30 command and control (CnC)servers associated with Pushdo were taken offline last week due to efforts by security vendor LastLine. The servers were supported by eight hosting providers, some of which did not respond to the vendor's requests for action.
New Fake TweetDeck Update – Beware of Spreading Malware
Many TweetDeck users have awaken to an unfortunate surprise this morning when trying to launch the application. What is the unfortunate surprise you ask? “It did not work!” Twitter has recently implemented major changes to how other applications access your Twitter account and hackers have taken the opportunity by implementing a malware since they know millions of Twitter users will be looking for the new updates. The fake Tweetdeck update that is actually a Trojan virus. A Trojan virus is malware that appears to perform a desirable function for the user but instead facilitates unauthorized access of the user's computer system.
Security Job Posting – Urgent Position -90k Network Security Specialist position in Alexandria VA
Our Client has an immediate need for a Network Security Specialist to support a true (24x7x365) NOC in Alexandria,VA for the USPTO (US Patent Trade Office) on the EUS contract. This is a perm requirement.