• Hack facebook passwords Free Download

    Updated: 2010-07-30 15:29:24
    Hack facebook passwords Free Download Home Login Sign Up Brothersoft Software Search For hack facebook passwords hack facebook passwords In Title Facebook 2.5 Access your Facebook account , chat and notifications anytime right on . Chrome Download now Size : 239KB License : Freeware Price : Free By : envieme passwords 0.4 A free program to store passwords and additional data in an encrypted database Download now Size : 76KB License : GPL Price : Free By : lalert Sponsor Links hack facebook passwords In Short Description No results were found containing hack facebook passwords In Short Description hack facebook passwords In Long Description AnchorFree Hotspot Shield 1.47 some hack er might be accessing your passwords credit card numbers , sensitive company data and much more . And standard

  • Shocking real crimes on Google Streets? No, it's another viral Facebook scam

    Updated: 2010-07-30 15:14:26
    Once again a viral scam is spreading rapidly across Facebook, posting messages on users' profiles in an attempt to trick the unwary into installing a rogue application. Here's a video where I demonstrate the attack: (Enjoy this video? You can check out more on the SophosLabs YouTube channel and subscribe if you like) Many Facebook accounts are [...]

  • GuardianEdge Windows 7 Looking Back

    Updated: 2010-07-30 11:13:46
    Like a lot of companies we are trying to go to Windows 7 sooner rather than later.   We skipped Vista and XP is starting to seem a bit old.   One of the things holding us back is GuardianEdge’s Full Disk Encryption product.   Here’s our timeline.  In October 2009 I asked GuardianEdge about Windows 7 support [...]

  • Happy bitchday from Facebook

    Updated: 2010-07-30 10:33:31
    Yesterday my colleague Pablo Teijeira, who is based in our Madrid office, logged into Facebook as normal and was confronted with a rather unusual message in place of the usual reminder of whose birthday it was today: Rather than "Hoy es cumple de" ("Today is the birthday of") the Spanish language version of Facebook was [...]

  • GPU Bruteforcing

    Updated: 2010-07-30 03:09:06
    My new computer from Pugent Custom Computers arrived via FedEx on Wednesday.  I am very happy with my computer and with the service provided by Pugent.   From my first visit to their website to the pictures they sent of my computer prior to shipping, I’d have to say they are first class.  I purchased the [...]

  • Happy SysAdmins Day

    Updated: 2010-07-30 01:38:23
    The last Friday in July is System Administrators Day.

  • Don’t Be Misled by Online Shopping

    Updated: 2010-07-29 23:51:30
    We have just noticed a cluster of fraudulent websites that attempt to mislead consumers. They use a common pattern: offering counterfeit products cheaper than the original to get consumers to send money. We expect consumers to try to get the best product or greatest utility for their money. Due to this desire, some consumers can [...]

  • Why Am I So Paranoid? Oh yeah, Black Hat is Going On

    Updated: 2010-07-29 18:28:39
    Every year during the Black Hat conference, something crazy happens that makes me paranoid about things I use during my everyday life without really thinking too much about it.  Last year, it was the MD5 Collision Attack that allowed the attackers to create a rogue Certification Authority. This year, it’s ATMs.  A researcher by the [...]

  • Android malware steals info from one million phone owners

    Updated: 2010-07-29 17:33:51
    Updated A developer of Android apps has been accused of using their apps to steal information from more than one million smartphone users. John Hering and Kevin MaHaffey, of mobile security firm Lookout, told the Black Hat security conference in Las Vegas that they discovered that a wallpaper app developed by Jackeey Wallpaper (who have created [...]

  • Details of 100 million Facebook users were *already* exposed on the net

    Updated: 2010-07-29 16:30:44
    Have you seen the headlines? They're pretty scary-looking. Here's just a handful - although there were hundreds more to choose from: "A fifth of Facebook users names 'leaked' to file-sharers", Techwatch "Details from 100 million Facebook profiles posted online", Network World "Details of 100m Facebook users collected and published", BBC News Online "100 million Facebook accounts exposed", V3 At [...]

  • Pentagon creates cyber command' for waging online warfare Technology guardian.co.uk

    Updated: 2010-07-29 07:20:38
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About Us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Community Blogs Jobs News

  • Home Cyber Security Challenge

    Updated: 2010-07-29 07:20:37
    Home About Why we need it Who’s involved Cyber Security Jobs Survey Q A News Competitions QinetiQ Network Defence DC3 Digital Forensics Challenge SANS Institute and Sophos Security Treasure Hunt Masterclass Prizes Candidates Registration Working in Cyber Security Cyber Security Jobs Sponsors Contact Us Cipher Home The Cyber Security Challenge is a series of national online games and competitions that will test the cyber security abilities of individuals and teams from every walk of life . It is designed to excite and inspire anyone considering a career in the cyber security . industry The Challenge will identify talented individuals capable of becoming part of the UK’s cyber security profession now and in the . future Why should I participate Participation in the Challenge offers three

  • Remote Jackpot: Hacking ATMs

    Updated: 2010-07-29 00:47:25
    Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We Have A Winner,” and watch the machine spew out all its money? That dream just became reality. At least in a great presentation from Barnaby Jack at the Black Hat Briefings in Las Vegas. “Jackpotting Automated [...]

  • Read This, Not That (a busy news week)

    Updated: 2010-07-28 22:00:29
    In a busy news week, perhaps the most important bit is that Verizon has released their 2010 DBIR.

  • Could this be the most stupid spam I have ever received?

    Updated: 2010-07-28 17:03:37
    Here's a spam email I just received: "I am not sure if you're aware of why your ranked this low.." Err.. I know this is a long shot, but could it possibly be because our website has nothing to do with perfume? Later on in the email there's a great P.S: What does this guy know that I don't. What [...]

  • Health Information Insecurity

    Updated: 2010-07-28 16:05:29
    A colleague lent me his most recent copy of IEEE’s Computer magazine.  Inside was an article entitled A Web 2.0 Model for Patient-Centered Health Informatics Applications (IEEE membership required to read).  Some possible benefits of their proposed approach were listed, including: Run deeper analytics across physicians groups and facilities, which can include relevant patient data… Provide a [...]

  • Fake anti-virus poses as free McAfee VirusScan

    Updated: 2010-07-28 10:53:04
    Fake anti-virus software (also known as scareware or rogue anti-virus) continues to be a big problem. Malicious hackers create programs that pretend to be legitimate anti-virus products, but are actually designed to frighten you into believing you have security problems with your computer (in the hope that you'll pay up for a cure). Overnight our [...]

  • Shocking video link worms its way rapidly across Facebook

    Updated: 2010-07-28 10:11:28
    The bad guys are at it again on Facebook. I have made a video demonstrating the latest attack, and how to clean up your Facebook account: (Enjoy this video? You can check out more on the SophosLabs YouTube channel and subscribe if you like) So, what's the background to the story? Well, in May of [...]

  • 'Mastermind' of Mariposa botnet arrested

    Updated: 2010-07-28 01:34:03
    Last week I blogged about the net closing in on a group of Slovenian hackers believed to be connected to the Mariposa botnet. Today it is being reported that a 23-year-old Slovenian, known as Iserdo, was arrested in the city of Maribor, Slovenia. The arrest comes after an international investigation involving the FBI and Slovenian [...]

  • Beware Bogus ‘Trial’ Version of VirusScan

    Updated: 2010-07-27 23:42:37
    First of all, this is not a sales pitch. McAfee offers several of its products for a trial period. However, we want you to know that we have just found a brand new variant of the Bredolab Trojan that is spreading by email with the following characteristics: Subject: “McAfee VirusScan Plus” Message body: “Download a [...]

  • Phishing for Amazon Users

    Updated: 2010-07-27 19:25:42
    We have noticed two frequent types of spam-phishing attacks targeting Amazon users. These messages at first appear to be legitimate, and the fake Amazon links end in a format such as this: <domain /index.php?pid=14>. Every link in the email goes to the same malicious page. One of these emails appears to be an order confirmation from amazon.com [...]

  • Citi iPhone banking app contains security flaw

    Updated: 2010-07-27 11:30:49
    iPhone-owning customers of Citigroup have been urged to update their mobile banking app immediately because of a security flaw that secretly stored account numbers, bill payments and security access codes in a hidden file. The Citi Mobile app allows customers to check their account balances, transfer funds and pay bills from their iPhone, and is one [...]

  • Downloader-CJX Cashing In on Microsoft .LNK Flaw

    Updated: 2010-07-27 00:34:02
    As McAfee Labs predicted in a previous blog post regarding the Microsoft Windows Shell .LNK vulnerability, it was just a matter of time before malware started using Exploit-CVE2010-2568 to take advantage of this new Microsoft zero-day flaw. The flaw is described in CVE-2010-2568. First, there was talk about PWS-Zbot (a.k.a. Zeus) using the vulnerability in [...]

  • DMCA Begins to Join 21st Century

    Updated: 2010-07-26 18:07:27
    People are relieved. In what has quickly become one of the mainstream tech media’s darling stories of the day, the U.S. Library of Congress has apparently woken up to find itself a decade into the 21st century and has released an updated list of allowed circumventions that do not qualify for punishment under the Digital [...]

  • Shortcut exploit: protect against it with this free tool

    Updated: 2010-07-26 15:01:03
    Sophos engineers have been busy developing and testing a free tool that protects users from malware exploiting the critical zero-day vulnerability known as the "Shortcut exploit". We have begun to see more hackers taking advantage of the exploit, spreading malware which takes advantage of Microsoft's unpatched vulnerability. Sophos has been doing a good job of protecting its [...]

  • Kingsoft Office 2010 Professional 6.6.0.2477 Released

    Updated: 2010-07-26 07:04:21
    Kingsoft Office 2010 Professional 6.6.0.2477 Released

  • BlueCoat ProxyClient

    Updated: 2010-07-24 01:53:53
    As I warned, I attended a BlueCoat seminar on Wednesday and I’m getting a few days worth of blog posts from that. In March of 2009, I blogged that I was testing the BlueCoat ProxyClient.   The ProxyClient provides URL filtering via WebPulse and also attempts to provide acceleration to VPN users and users on slower [...]

  • BlueCoat WebPulse

    Updated: 2010-07-23 17:19:09
    As I mentioned, I was at a BlueCoat Web Security briefing on Wednesday. Most of the talks covered things I already knew.   I’m well aware of BlueCoat’s product line, and the web security stuff I received that in a meeting earlier in the year.   But the security stuff was good review.   It is rather interesting [...]

  • BlueCoat Security Briefing

    Updated: 2010-07-23 06:19:00
    On Wednesday, I went to the BlueCoat Security Briefing at the Tyson’s Corner Marriott.  The big news for me was that our hardware (SG810-B and SG510-B) which I’d been led to believe was going to end-of-support in November is good for another year.  Even today the end of life matrix says TBD, but typically end of life [...]

  • Encrypt stored data in Android

    Updated: 2010-07-21 20:52:10
    Due to the way Android requires SD cards to be formatted in VFAT, it leaves a bit of a hole when it comes to security for files stored here. VFAT is an old standard that doesn’t support the access controls of Linux, so data stored here is unprotected.  Because of this, all storage here is [...]

  • Microsoft Zero-Day: Malformed Shortcut Vulnerability

    Updated: 2010-07-20 04:57:53
    Today Microsoft updated the security advisory that was initially published last Friday (July 16), stating that they’re working on issuing a security patch for this vulnerability. Earlier, malware exploiting this issue was found in the wild. Researchers at McAfee Labs have been busy tracking this issue over the weekend and we have come up with [...]

  • Notes from The Next HOPE

    Updated: 2010-07-19 19:11:12
    HOPE was this weekend at the Hotel Penn in New York City. Except for the choice of venues, it’s a pretty nice (and cheap) conference to get to. I went to several of the talks, although, not all of them would be interesting to purely security people – like cooking for geeks… [...]

  • Blackberry security

    Updated: 2010-07-16 22:31:35
    All the security settings in the world don’t matter if they aren’t turned on. According to the Washington Examiner, the social security numbers names and addresses of nearly 700 Prince William County Virginia residents was potentially disclosed when a county issued Blackberry was stolen.  The Blackberry stolen from a vehicle parked in a county employee’s [...]

  • That’s Not from the Copier

    Updated: 2010-07-16 21:53:19
    A lot of copiers now have the ability to scan documents and email the result as a PDF. I’ve never quite understood why people don’t take the time to change the default subject line. On a Xerox it is something like “Scan from a Xerox WorkCentre” to something a bit more descriptive. Worse yet, I’ve [...]

  • Koobface Going for Broke?

    Updated: 2010-07-16 21:40:20
    The Koobface worm has been one of the top malicious threats to Facebook users since 2008. Like most threats, Koobface has morphed over time, adding and changing malicious payloads, while maintaining the ability to propagate, or spread, from one system to another. A common misconception is that viruses often delete files or cause irrevocable system damage. There certainly [...]

  • More Koobface URLs Plague Users

    Updated: 2010-07-16 21:30:06
    McAfee Labs researchers have seen a noticeable spike in URLs leading to Koobface malware. (Koobface is an anagram of Facebook.) The latest, unexpected Koobface campaign spreads by tricking Facebook users into downloading and running links with the following characteristic: URL format: <Domain/variable/setup.exe> All of these have been found in the same MD5: 9cac65b88d2288fb16f8a356c3563604. Koobface malware, since its first appearance in [...]

  • Microsoft Releases July Security Bulletin

    Updated: 2010-07-16 21:21:55
    Details of this month’s Patch Tuesday updates here:  http://www.microsoft.com/technet/security/bulletin/ms10-jul.mspx This month, we get a fairly light load of patches for Windows and Office, but there are a few remote code execution vulnerabilities that are addressed.  So, if you run Windows and/or Office, apply these patches as soon as possible. If you’re running Windows XP or Windows [...]

  • Porn Detector iBot

    Updated: 2010-07-16 04:20:41
    Find out what people on doing on your computer when you're not around. The Porn Detector iBot(tm) instantly scans your entire computer for pornographic images with up to 99% accuracy - even if the images were deleted.

  • Chat Recovery iBot

    Updated: 2010-07-16 04:20:40
    What looks like a regular USB key plugs into your computer to capture all chat logs so you can find out exactly what your children or family members are saying online.

  • iTrail GPS Data Logger

    Updated: 2010-07-16 04:20:39
    The smallest GPS logger available, the iTrail captures GPS location and detailed information like speed and time. Perfect for keeping track of everything from family members to important assets, the iTrail helps you monitor exactly where the things you care about have been.

  • Color Wireless Digital Picture Frame Clock Camera

    Updated: 2010-07-16 04:20:37
    It looks like the popular digital picture frames, but hidden in this frame is a tiny camera that covertly transmits video to a USB or RCA receiver up to 500 feet away. Easily view live footage on a computer, monitor, TV, or record for later viewing.

  • Color Wireless Cube Clock Radio Camera

    Updated: 2010-07-16 04:20:35
    Wirelessly transmit video from the completely covert cube clock to a USB or RCA receiver up to 450 feet away. Easily view live footage on a computer, monitor, TV, or record for later viewing.

  • Color Wireless Mantel Clock Camera

    Updated: 2010-07-16 04:20:34
    <img align=left src=http://ep.yimg.com/ca/I/yhst-81126207287951_2116_107548964Designed to look and act like an ordinary mantel clock, it doubles as a covert hidden camera that streams video footage up to 500 feet to your monitor or TV without detection. Easily view and or record live footage on a computer, monitor, TV or external DVR.

  • Color Wireless Wall Clock Camera

    Updated: 2010-07-16 04:20:32
    Designed to look like a regular wall clock, this camera records high resolution surveillance footage when motion is detected, and wireless streams it to your TV, monitor, or computer.

  • Color USB/RCA Wireless Air Purifier Camera

    Updated: 2010-07-16 04:20:31
    Designed to look and work like an ordinary air purifier, this truly is a hidden camera thanks to its wire free design that wirelessly streams video to a receiver up to 500 feet away. View or record footage on any TV, monitor, or computer.

  • Standalone H.264 DVR (4 Channel with Remote View)

    Updated: 2010-07-16 04:20:19
    This Internet enabled DVR gives you total access to your video surveillance anytime, anywhere. Record H.264 highest resolution video from up to four cameras.

  • True Color Mini Camera

    Updated: 2010-07-16 04:20:14
    This motion-activated camera may be tiny, but it's powerful enough to capture crystal clear surveillance footage day or night.

  • Pet Cemetery

    Updated: 2010-07-16 02:56:05
    A lot of copiers now have the ability to scan documents and email the result as a PDF. I’ve never quite understood why people don’t take the time to change the default subject line. On a Xerox it is something like “Scan from a Xerox WorkCentre” to something a bit more descriptive. Worse yet, I’ve [...]

  • How to write code that doesn’t suck

    Updated: 2010-07-15 07:03:35
    Web application hacking is big business. Even the traditionalist network penetration testers are crossing over to the new security rock and roll scene. The average individual doesn’t know what DNS does, and if I said, “I knocked over the internet by attacking BGP,” at a cocktail party, guests would probably suspect I just [...]

  • Code with JavaScript: Letters and Numbers Optional

    Updated: 2010-07-13 18:16:32
    Last year I discovered an unusual but useful method for writing web application code: non-alphanumeric JavaScript. This technique has been pioneered by several script ninjas on the hackers forum sla.ckers.org and lets you write scripts without directly using letters or numbers. Application filters or sandboxes may catch typical attacks by monitoring for requests such as [...]

  • Social Networking Threats: New Report From McAfee Labs

    Updated: 2010-07-12 21:47:40
    Social networking sites and technologies are among the hottest happenings on the Internet. However, in this case every benefit comes with an equal danger: These sites and technologies are also huge targets for cybercriminals. One of McAfee Labs senior researchers, Anthony Bettini, has written an excellent whitepaper on the subject. Social Networking Apps Pose Surprising [...]

  • Lifelock and Menard

    Updated: 2010-07-12 19:12:42
    Radio hosts reading commercials often try to sound live and ad libbed (a “live read”) when doing commercials.   Its one thing when discusing how great Snapple is, its another thing when discussing a technical topic.   I wonder if these live reads are approved by legal. Today I heard a radio show advertising lifelock which used [...]

  • Odd Magazine: Disinformation at Play?

    Updated: 2010-07-09 20:51:57
    Since the end of June, the media have been talking about a possible new magazine distributed by Al-Qaeda and promoted on various Islamic websites. One reason I was interested by this document was a message I read in some extremist forums saying it could contain viruses and spyware. In searching I found two documents. Each had [...]

  • A Brief Look at O5Logon

    Updated: 2010-07-09 04:35:21
    For authentication, newer versions of Oracle (11g+) use a session agreement and key exchange scheme known as O5Logon. It has some of the same weaknesses of authentication as the O3Logon used in previous versions of Oracle. An example transcript of the default auth process: 1) Client connects to Server: 2) Client sends Username to Server 3) Server generates a [...]

Current Feed Items | Previous Months Items

Jun 2010 | May 2010 | Apr 2010 | Mar 2010 | Feb 2010 | Jan 2010