Search   Feed   Browse   Add
Feed items 1 - 10 of 10 for July 2008

Hacker's firm doubleTwist enables copying of iTunes - (Found July 2, 2008 )

A start-up co-founded by famed Norwegian hacker "DVD Jon" is on Tuesday introducing a service that enables users to copy and use copy-protected Apple iTunes songs on many popular non-Apple devices. The San Francisco-based company, doubleTwist, is releasing a service that makes it easy for consumers to share both user-generated and professionally created audio, photos and video clips via computers, certain mobile phones or PSP game players.
http://deepquest.code511.com/blog/comments.php?id=483_0_1_0_C

Hackers Launch Major Attack on US Military Labs - (Found July 2, 2008 )

Hackers have succeeded in breaking into the computer systems of two of the U.S.' most important science labs, the Oak Ridge National Laboratory and Los Alamos National Laboratory. In what a spokesperson for the Oak Ridge facility described as a "sophisticated cyber attack," it appears that intruders accessed a database of visitors to the Tennessee lab between 1990 and 2004, which included their social security numbers and dates of birth. Three thousand researchers reportedly...
http://deepquest.code511.com/blog/comments.php?id=475_0_1_0_C

Trojan hijacks Google text ads - (Found July 2, 2008 )

A new Trojan that hijacks Google text ads and replaces them with ads from a different provider has been picked up by BitDefender. The antivirus company has identified the threat as Trojan.Qhost.WU which modifies the infected computer's host file, a local storage for domain nameIP address mappings. The infected machine's browser then reads advertisements from a server at the replacement address rather than from Google.
http://deepquest.code511.com/blog/comments.php?id=476_0_1_0_C

Record data breaches in 2007 - (Found July 2, 2008 )

The loss or theft of personal data such as credit card and Social Security numbers soared to unprecedented levels in 2007, and the trend isn't expected to turn around anytime soon as hackers stay a step ahead of security and laptops disappear with sensitive information. And while companies, government agencies, schools and other institutions are spending more to protect ever-increasing volumes of data with more sophisticated firewalls and encryption, the investment often is too little too late.
http://deepquest.code511.com/blog/comments.php?id=477_0_1_0_C

The first spyware spreading with Facebook application - (Found July 2, 2008 )

The first spyware spreading with Facebook application has been discovered. Security company Fortinet reports that application called Secret Crush is installing Zango (aka AdWare.Win32.180Solution) with Iframe, technically from ZangoCash.com. In opening the request, the recipient is informed that one of hisher friends has invited himher to find out more information by using Secret Crush (this happens frequently with Facebooks Platform Application). Figure 2 exhibits the...
http://deepquest.code511.com/blog/comments.php?id=478_0_1_0_C

Open Source: 1 security exposure for every 1,000 lines of code - (Found July 2, 2008 )

Open source code, much like its commercial counterpart, tends to contain one security exposure for every 1,000 lines of code, according to a program launched by the Department of Homeland Security to review and tighten up open source code's security. Popular open source projects, such as Samba, the PHP, Perl, and Tcl dynamic languages used to bind together elements of Web sites, and Amanda, the popular open source backup and recovery software running on half a million servers, were all...
http://deepquest.code511.com/blog/comments.php?id=479_0_1_0_C

$20,000 Bounty Placed on Windows Flaws, Exploits - (Found July 2, 2008 )

A private company has placed a $20,000 bounty on exploitable vulnerabilities in Microsoft's Windows operating system, a move that significantly raises the value of software flaw research. Billed as a Hacker Challenge, the $20,000 "special prize" is being offered by Digital Armaments, one of several companies that pay hackers who agree to give them exclusive rights to advance notification of unpublished vulnerabilities or exploit code.
http://deepquest.code511.com/blog/comments.php?id=480_0_1_0_C

Most home routers 'vulnerable to remote take-over' - (Found July 2, 2008 )

The weakness could allow attackers to redirect victims to fraudulent destinations that masquerade as trusted sites belonging to banks, ecommerce companies or health care organizations. The exploit works even if a user has changed the default password of the router. And it works regardless the operating system or browser the computer connected to the device is running, as long as it has a recent version of Adobe Flash installed.
http://deepquest.code511.com/blog/comments.php?id=481_0_1_0_C

AvSoft Technologies website hacked - (Found July 2, 2008 )

n what must be quite an embarrassing episode, Indian anti-virus company AvSoft Technologies has had its website hacked. Rather than offering protection from viruses, the site started downloading a virus to users machines. AvSoft is a little-known security company, offering two main products, SmartCOP and SmartDOG. It also offers a service for recovering data after a virus attack has occurred
http://deepquest.code511.com/blog/comments.php?id=482_0_1_0_C

QuickTime streaming media exploit targets unpatched bug - (Found July 2, 2008 )

Hackers have created a proof-of-concept exploit for an Apple QuickTime player streaming media vulnerability. Release of the exploit on Sunday follows hot on the heels of the public disclosure of the as-yet-unpatched buffer overflow bug, which involves the QuickTime RTSP (Real Time Streaming Protocol) Response Header, on 23 November by Polish security researcher Krystian Kloskowski. Symantec reports that the exploit might be applied to attack users of the latest version of...
http://deepquest.code511.com/blog/comments.php?id=474_0_1_0_C
Available Archives
- July (10 items)
Sponsored Links
© 2008 FeedCapsule.com  |  Contact