• Making money with mobile malware

    Updated: 2010-09-30 22:15:27
    Remember the old days of dialler Trojan horses? Back when most of us didn't have broadband at home, and connected to the internet via a modem, we saw a type of malware which could take advantage of the phone line plugged into the back of your PC and dial and expensive premium rate number. In this way, [...]

  • U.S. Arrests Zeus-Operating Cybercriminals

    Updated: 2010-09-30 18:51:59
    It looks like some of the recent success in taking down Zeus-using cybercriminals is coming to the United States. The FBI has recently announced that it has charged as many as 60 people and has arrested 10 as part of a global cyberfraud scam. Summaries of the incident can be found here, here, and here. Zeus [...]

  • Fuzzing

    Updated: 2010-09-30 15:47:47
    Fuzzing is a fairly recent term for what pen testers (and testers in general) have been doing for years – feeding invalid data to a program/web page/etc and seeing what happens. When you wrote your first C program that had to take command line arguments – did you ever mash on the keyboard and see [...]

  • An Interesting bypass…

    Updated: 2010-09-30 14:56:45
    An Interesting bypass… I was analyzing a piece of malware the other day and came across a unique method to place malware locally on a host without using the network to transfer it. This is something that is so simple in design, and yet so effective in it’s delivery. Let’s take a bit of a closer [...]

  • Beware malicious LinkedIn invitation reminders

    Updated: 2010-09-30 14:41:28
    In a world where cybercriminals frequently target users of social networks such as Facebook and Twitter on a regular basis, fans of business network LinkedIn don't get away scot free. Take, for example, this malicious attack that we have seen spammed out over the last few days. You receive an email in your inbox which appears, to [...]

  • 12th ACM International Conference on Ubiquitous Computing UBICOMP2010

    Updated: 2010-09-30 13:34:43
    Latest Updates The list of accepted Papers Notes is . online We are updating the Technical Program The call for poster video demo is now . closed Registration is now open for Ubicomp 2010. The Author Kit for final camera-ready papers is . available The list of Workshops is now online . The call for the Doctoral Colloquium is . close The call for Paper and Notes is now . closed The U bicomp 2010 Submission System is now . open The Program Committee has been published , and the Ubicomp 2010 templates are now . available The Call for Participation has been updated . nbsp Papers and Notes March 12, 2010 Workshops March 26, 2010 Posters , Demos Videos June 25, 2010 Home Participation Workshops Program Organizers Attending Community 12th ACM International Conference on Ubiquitous Computing

  • The Computer Laboratory

    Updated: 2010-09-29 21:33:11
    Skip to content Access key help Search Advanced search A–Z Contact us Computer Laboratory Faculty of Computer Science and Technology The Computer Laboratory is an academic department within the University of Cambridge that encompasses Computer Science , along with many aspects of Engineering , Technology and Mathematics . It consists of 38 full-time academic staff , 25 support staff , 40 post-doctoral research workers and 154 PhD students . Information for Prospective students Current students Staff and research students Information about The Computer Laboratory People Research Courses Seminars News PhD student wins best student paper award at MASCOTS 10. Computer Laboratory student wins prestigious undergraduate . award PhD student wins Best Paper Award at IWITMA 2010 PhD students win

  • Inside Facebook security, and how to better protect your account

    Updated: 2010-09-29 20:23:53
    Facebook's Nick Bilogorskiy kicked off proceedings at the Virus Bulletin 2010 conference in Vancouver this morning, giving the social network's view on the scale of the cybercrime problem. Bilogorskiy, who heads up the anti-malware team at the social networking giant, revealed some jaw-dropping statistics and fascinating facts: 23 billion minutes are spent each day by people on [...]

  • Microsoft issues emergency out-of-band patch for ASP.Net

    Updated: 2010-09-29 14:03:36
    Microsoft has responded to news of a serious security vulnerability in the way that ASP.Net web applications are secured by issuing an emergency patch. And you know that if a problem is serious enough for Microsoft decides to release a fix outside of its normal "Patch Tuesday" monthly schedule that it's definitely an important vulnerability. And rightly [...]

  • HD Waterproof Spy Watch DVR with 8 Gb Built-in Memory

    Updated: 2010-09-29 13:32:26
    Covert Watch DVR records hours of HD video footage and is safe to use in any kind of weather. Not only does it record clear video footage, but it also doubles as a voice recorder and snaps clear photos on-the-go.

  • Web-Enabled Digital Microscope Camera

    Updated: 2010-09-29 13:32:25
    Zoom into hard to see objects using the USB microscope camera and capture high resolution photos directly from the microscope.

  • Computer cops arrest 19 in dawn ZBot raid

    Updated: 2010-09-29 07:33:19
    19 people have been arrested by British police, under suspicion that they stole millions of pounds from online bank accounts by installing malware. Detectives from the Metropolitan Police Central e-Crime Unit (PCeU) swooped a number of addresses in a dawn-time raid in London, arresting 15 men and four women, aged between 23 and 47 years old. You [...]

  • Application-Based Control: the Future of Botnets?

    Updated: 2010-09-29 01:00:38
    During the last six years, botnets have become one of the biggest threats to security professionals, businesses, and consumers. We at McAfee Labs have just released more information about how cybercriminals can use common social networks and common web applications, such as Twitter and XMPP-enabled applications like Google Talk, to take over a user’s computer. As [...]

  • New Report: ‘Reputation: The Foundation of Effective Threat Protection’

    Updated: 2010-09-28 16:55:24
    On April 30 www.multimedia***.com, a newly registered website that allowed users to post, search, and view amateur videos, came online. The site was part of a group of 160 new domain registrations, and was identified by the network of sensors and data feeds that contribute to McAfee Global Threat Intelligence. Seemingly legitimate, many of these [...]

  • Global Web 2.0 Report Released

    Updated: 2010-09-28 00:57:56
    Today, McAfee released a report based on a survey of more than 1,000 decision-makers about the use of Web 2.0 technology for business. The report reveals some interesting results (for example, who would have thought the United States is among the countries with the lowest adoption rate, and Germany is the country with the most companies [...]

  • WTF? Twitter gets the goat as viral message spreads

    Updated: 2010-09-26 19:55:45
    Twitter has responded rapidly to shut down a new worm, which spread vulgar messages from many affected users' accounts saying they err.. were fond of goats. Some high profile Twitter users, including Robert Scoble, fell foul of the attack. Of course, having such popular Twitter users affected accelerated the spread of the message. The messages read [...]

  • Shortcut Key in Kingsoft Writer 2010

    Updated: 2010-09-26 11:28:56
    Shortcut Key in Kingsoft Writer 2010

  • How to change license Key in Kingsoft Office 2010

    Updated: 2010-09-25 11:46:41
    How to change license Key in Kingsoft Office 2010

  • Stuxnet Update

    Updated: 2010-09-25 01:30:06
    Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of the frequently asked questions we’ve received. Q: What is Stuxnet? A: Stuxnet is a highly complex virus targeting Siemens’ SCADA software. The threat exploits a previously unpatched vulnerability in Siemens SIMATIC WinCC/STEP 7 (CVE-2010-2772) and four vulnerabilities in [...]

  • Microsoft Security Essentials Now Free For Businesses (kind of)

    Updated: 2010-09-23 22:07:53
    Source In early October, Microsoft will be making the Microsoft Security Essentials suite free for small businesses (i.e., fewer than 10 computers) in addition to home users.  This is a good thing – MSSE is a good suite of security tools, and the price tag is just right for individual and small business users. However, [...]

  • Gemini/KRvW Training at AppSecDC 2010

    Updated: 2010-09-23 17:21:57
    Please join Gemini Security Solutions at AppSecDC 2010 where we will be delivering a 2-day “Software Security Best Practices” course based on the materials we support from KRvW Associates. The course is $1,495 and will run November 8-9 here in Washington, D.C. Course Description: This tutorial starts with a description of the security problems faced [...]

  • Kingsoft office the efficient and affordable way to better system performance

    Updated: 2010-09-23 03:24:40
    Kingsoft office the efficient and affordable way to better system performance

  • Major ASP.NET Vulnerability

    Updated: 2010-09-22 15:33:16
    A new problem has been uncovered that allows an attacker to obtain encrypted session cookies or other encrypted/protected data stored on any version of ASP.NET from Windows XP to Windows 7 and 2008 R2.  When properly exploited, the attacker gets full administrative rights to the application and gets access to files such as the web.config [...]

  • The Golddigger Virus

    Updated: 2010-09-22 05:30:28
    Last week, I received an urgent call from the IT Director who had the company comptroller on speakerphone.   They had been told about a virus that performs social engineering, creates new employees, and transfers your funds to a swiss bank account.   It’s called the Triple D virus.  I like to think I keep up on current security news, [...]

  • Does Mainstream 2-Factor Matter?

    Updated: 2010-09-21 14:00:19
    The “big” news of the week (thus far), if you can call it that, is Google’s announcement of the availability of soft tokens for Google Apps as of today (read about in their post “Moving security beyond passwords“). From a security perspective I’m greatly underwhelmed. Maybe I’ve just become jaded in my old age, but [...]

  • How to make the watermarks in Kingsoft Office

    Updated: 2010-09-20 09:41:25
    20th, Sept, 2010. From KSOffice Team When we use office software to makeing the document for transfer to others, watermark is one of the most important function. It can contains your logo or other trademark and so on. Also you can use it for showing the readers some other necessary information. Most of Users already are [...]

  • What’s New in Kingsoft Office 2010?

    Updated: 2010-09-18 01:15:43
    18th, Sept, 2010 from KSOffice Team Strong Compatibility Kingsoft Office 2010 provides a high level of compatibility with your documents, allowing you to create, open, modify and save in a variety of formats including all of your existing documents regardless of where they were created. Support *.doc ,*.docx , *.xls ,*.xlsx, *.ppt, *.pptx Excellent Document Security Kingsoft Office 2010 [...]

  • “A very warm invitation to you,” Courtesy of a Mass-Spam Run

    Updated: 2010-09-17 21:52:05
    McAfee Labs has been monitoring a spam run that was launched earlier today. The message follows: Subject: A very warm invitation to you Body: Hello, Hope your week has been wonderfull well.  I would like to extend a very warm invitation to you to the Verbum Dei Missionary Festival this Sunday, September 19. With a lot of support and collaboration from [...]

  • Why choose Kingsoft Office for Enterprise customers?

    Updated: 2010-09-17 00:57:15
    Why choose Kingsoft Office for Enterprise customers?

  • Phishing Scam Trolls for EFTPS Users

    Updated: 2010-09-15 23:13:09
    A new phishing scam is targeting users of the Electronic Federal Tax Payment System (EFTPS), a free service provided by the U.S. Department of the Treasury since 1996. The recent fraudulent format uses an email message that claims to be a rejected tax payment and directs users to a fake website for additional information. Remember, don’t [...]

  • Livewire ATX: Hardwired GPS Vehicle Tracking System

    Updated: 2010-09-15 06:53:44
    This GPS GSM tracker works where other trackers fail. Able to track indoors and outdoors, the Asset GPS Tracking System gives you real-time tracking location information so you can locate your vehicle anywhere, anytime.

  • BlueCoat DNS

    Updated: 2010-09-14 15:38:44
    I’ve been having some issues with BlueCoat DNS for a few days now.   Since I’m not seeing a huge outcry, I”m wondering if its just me. It started with warning emails from each BlueCoat appliance saying they “Download of the BlueCoat WebFilter database failed.”   It is trying to download a file from https://list.bluecoat.com.   A WHOIS [...]

  • World of Warcraft Spearphishing and Botting

    Updated: 2010-09-13 15:58:57
    Over the weekend I had the chance to put some work into my lowbie dwarf paladin named Boulderbrain. I was at the Stormwind bank minding my own business when I suddenly get this whisper: Now normally I simply ignore most whispers I get in-game (other times I simply don’t notice them) but this one caught [...]

  • More security aquisitions

    Updated: 2010-09-13 15:23:10
    HP announced this morning that it would buy ArcSight. This follows Intel’s acquisition of McAfee last month. This isn’t the first time a large computer maker/systems offering has purchased a security company, but what does it mean for our industry? Will it mean that McAfee will only run on Intel computers (not that there are [...]

  • Smart HD Mini DVR

    Updated: 2010-09-11 08:21:50
    This 2 inch clip on camera acts as a body worn surveillance video camera, takes pictures, and records sound all in one tiny package. Clip it to yourself or perch the tiny camera anywhere to capture surveillance anywhere, anytime.

  • Webmail Account Compromises

    Updated: 2010-09-10 05:39:48
    A couple of my friends had their webmail accounts compromised and I got pharma spam  from them over the weekend.   One had a Hotmail account and another a Yahoo account.   I’m not sure whether they should be mocked more for using accounts at those domains or for getting compromised. Restoring Access If this happens to you and you’re really [...]

  • Moving to a Forum

    Updated: 2010-09-08 21:55:46
    For CSE 484 this year, we have switched from the blog format to the forum format.  The course website is online at http://www.cs.washington.edu/education/courses/484/10wi/.  This year’s forum is online at https://catalysttools.washington.edu/gopost/board/kohno/14597/.  We switched from the blog format to the forum format because forums seem to provide a better opportunity for interactive discussions within the course.

  • Current Event – A Broader Look on Wireless Access Point Vulnerabilities

    Updated: 2010-09-08 21:55:46
    Wireless access points are a great technology – allowing a user the convenience of accessing the same wired network without wires.  But the vulnerabilites and weak points that they produce can often be overlooked.  Most people install these devices to extend their network to laptop or other wireless users, and can be secured if they [...]

  • Current Event : Keyboard hacking (from thin air!)

    Updated: 2010-09-08 21:55:46
    A move over scanning the keyboard with infra-red cameras for heat signatures, listening to keystrokes and simple shoulder surfing. Say hello to hacking through thin air or electromagnetic waves, rather. Apparently, all keyboards generate unique electromagnetic waves for every single key pressed and these are really easy to pick up even with some inexpensive antennae. [...]

  • Security Review: Urban Chicken Coops

    Updated: 2010-09-08 21:55:42
    Chicken coops form the heart of many urban farmers’ livelihoods. Providing sustenance directly through eggs, indirectly through fertilization of soil, and supplementing any waste management system through the digestion of otherwise unusable organic matter, the occupants of these structures play a vital role in small-scale subsistence living. Yet with such a range of assets come [...]

  • Google’s Online Library

    Updated: 2010-09-08 21:55:40
    Google has been scanning whole books and archiving them since at least 2004.  More recently, it settled a lawsuit that will allow it to legally copy copyrighted books and making them available online.  Google allows users to search their book archive at Google Book Search, and view samples or in some cases entire books.  While [...]

  • Security Review: New Weapons in the Fight Against Doping

    Updated: 2010-09-08 21:55:39
    The use of performance enhancing drugs and medical techniques is a serious problem in every sport, but no sport is as notorious for doping scandals as is professional cycling. While Olympic athletes, baseball players, and body builders are often caught boosting, the effect of their “cheating” on the sport, society, and economy is minimal. Marion [...]

  • Security Review: Online Taxes

    Updated: 2010-09-08 21:55:38
    For the last couple of years, I have done my taxes online.  Compared to doing them by hand on paper, the online method takes far less time to fill out.  However, it also brings with it the host of security risks associated with entering sensitive data over the internet.  To successfully file your tax return, [...]

  • Security Review: Helios Online Voting

    Updated: 2010-09-08 21:55:38
    The Technology The technology being evaluated is the Helios Online Voting Booth, usable at http://www.heliosvoting.org and outlined in the 2008 Usenix Secuirty paper available at the same site. The election system does not create novel cryptographic tools or algorithms, rather it provides a protocol for using existing cryptography to make an election that is universally [...]

  • Security Review: Eye-Fi

    Updated: 2010-09-08 21:55:35
    Eye-Fi “The Eye-Fi Card stores photos & videos like a normal memory card. When you turn your camera on within range of a configured Wi-Fi network, it wirelessly transfers your photos & videos. To your computer. Or to your favorite photo sharing web site. Or both.” The Eye-Fi card is an SD memory card used [...]

  • Security Review: Hollywood Awards Presentations

    Updated: 2010-09-08 21:55:34
    Big Hollywood parties have big time guest lists, so it’s no wonder that many people want to be there.  These include both (mostly) benign fans and some people of the less benign variety.  Hence, security at these events is a big deal.  In 2000, the event’s security made national headlines when the oscar statues were [...]

  • Teen Guide to Safe Blogging

    Updated: 2010-09-08 21:55:11
    Larry Magid's open letter to teen age bloggers - and their parents

  • How Did You teach Your Kids To Be Safe When They Were Learning To Surf The Internet?

    Updated: 2010-09-08 21:55:10
    Take a few minutes to share your experiences in teaching your kids Internet Safety - and check out what other parents have done

  • Online Security Tips ebook - with Bonus

    Updated: 2010-09-08 21:55:09
    Vital Security Tools and Tips to Secure Your Computers - Guard Against Fraud and ID theft - includes PC Safety book plus free Resale Rights

  • Internet Security Articles

    Updated: 2010-09-08 21:55:09
    A Library of Free Internet Security Articles and Computer Safety Articles and Reports on Maintaining Your Computer Protection against adware, spyware, vituses and trojan horses

  • Family Safety Guidelines for Protecting Our Children

    Updated: 2010-09-08 21:55:09
    Internet safety policies and practical guidelines to help make the Internet safer for children and their families.

  • digg.com: Stories Security Upcoming

    Updated: 2010-09-08 21:55:09
    , , : What people are searching for : digg.com : Stories Security Upcoming Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 4.2 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 6.8 BORING 1 2 3 4 5 6 7 8 9 10 2.0 SPAM 1 2 3 4 5 6 7 8 9 10 digg.com : Stories Security Upcoming digg.com : Stories Security This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Mon Jun 8 09:17:17 2009 Internet security cameras , the future of home surveillance Home security has just hit the stratosphere with internet home security cameras . A decade back , connectivity to the at Arkansas City but you are in Hong Kong . Sounds quite futuristic , but ,

  • Privacy New Messages

    Updated: 2010-09-08 21:55:04
    , , What people are searching for : Privacy New Messages Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 6.6 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 5.0 BORING 1 2 3 4 5 6 7 8 9 10 5.7 SPAM 1 2 3 4 5 6 7 8 9 10 Privacy New Messages Privacy . Our 30 newest forum messages . board-fdboard.topic.feed.xml This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Fri Jun 19 10:22:51 2009 Investigations Investigations Have you hired an investigator Investigations Investigations Investigations Have you hired an investigator . Investigations By can help minimize your risk . 3 Many people have obtained useful information about a

  • http: www.remote-security.com

    Updated: 2010-09-08 21:55:01
    , , : What people are searching for : http : www.remote-security.com Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 2.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 3.8 BORING 1 2 3 4 5 6 7 8 9 10 2.5 SPAM 1 2 3 4 5 6 7 8 9 10 http : www.remote-security.com This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Tue Feb 20 12:37:23 2007 Distributor of : MPEG4 GeoVision , Avermedia Linux DVR , H264 ILDVR DVR cards and Flexwatch IP camera for remote security video . surveillance DVR Card for . Linux Avermedia AVerDVR DX5000, Digital video cards for Avermedia EB1104NET : embedded Linux standalone dvr Avermedia embedded Linux

  • The Register - Security

    Updated: 2010-09-08 21:55:01
    , , What people are searching for : The Register Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sat Jun 20 00:06:43 2009 Tiny-traffic DoS attack spotlights Apache flaw Denial of Service without the flood Security guru Robert RSnake Hansen has released a novel DoS attack tool that US net nanny ratchets Chinese censorware spat Stall the PC makers . Then sue US software maker

  • The Register - Security: Enterprise Security

    Updated: 2010-09-08 21:54:59
    , , : What people are searching for : The Register Security : Enterprise Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security : Enterprise Security Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:11:38 2009 January's Windows 7 hole still open Sort it out , Redmond A security hole in Windows 7, highlighted by a blogger back in January , is still wide open UK.gov to create central cybersecurity agency A job for Jim

  • ASTALAVISTA.com - the hacking and security community

    Updated: 2010-09-08 21:54:58
    , , What people are searching for : ASTALAVISTA.com the hacking and security community Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 1.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 1.0 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 ASTALAVISTA.com the hacking and security community News about IT , security , hacking and Internet Copyright : Copyright 2008, This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sat Jan 10 05:57:22 2009 XMAS Offer for astalavista.NET XMAS Offer for Nokia , Others Deal Major Blow To Android Nokia , Others Deal Major Blow To Mass SQL injection Mass SQL Wanted : 10 IT skills employers

  • All about Internet Security and Privacy, Spyware, Virus......

    Updated: 2010-09-08 21:54:58
    Listing title: All about Internet Security and Privacy, Spyware, Virus....... Category: Privacy. Subcategory: informationItems in this feed:Why Is The Malicious Software Removal Tool Needed.. What is a security certificate Burning Bridges is Bad, But Firewalls are GoodThe Trip Falls of Internet ShoppingDetect, Protect, Dis-infectVirus prevention and removalStrong PasswordsIs Your Computer Sick Virus ProtectionSecurity: Ad Blocking

  • The Register - Security: Enterprise Security

    Updated: 2010-09-08 21:54:57
    , , : What people are searching for : The Register Security : Enterprise Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security : Enterprise Security Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:06:23 2009 January's Windows 7 hole still open Sort it out , Redmond A security hole in Windows 7, highlighted by a blogger back in January , is still wide open UK.gov to create central cybersecurity agency A job for Jim

  • The Register - Security: Anti-Virus

    Updated: 2010-09-08 21:54:56
    , , : What people are searching for : The Register Security : Anti-Virus Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 3.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security : Anti-Virus Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Fri Jun 19 12:24:41 2009 MS names ship date for free security suite Free as in lunch Microsoft is launching its free security suite next week the 23rd of June to be precise.… Firefox update squashes 9 security bugs , 4 critical Get yours today

  • Security Fix

    Updated: 2010-09-08 21:54:56
    , , What people are searching for : Security Fix Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Security Fix Brian Krebs on computer and Internet This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Fri Jun 19 15:40:37 2009 Web Fraud 2.0 : Franchising Cyber Crime For the most part , cyber gangs that create malicious software and spread spam operate as shadowy , exclusive were really installing . What we found was the installation program given by InstallsCash to distributors installs Malicious Attacks Most Blamed in 09 Data

  • Latest Security, Filtering Monitoring entries at eCRM Product Guide

    Updated: 2010-09-08 21:54:54
    , , , What people are searching for : Latest Security , Filtering Monitoring entries at eCRM Product Guide Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 5.5 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Latest Security , Filtering Monitoring entries at eCRM Product Guide http : products.ecrmguide.com : IT Computer Hardware and Software Products Briefings and This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Tue Jun 2 10:05:53 2009 System Monitoring Software System monitoring tool record typed keystroke System monitoring utility monitors all typed keystrokes

  • Affiliate Marketing Journal - Security

    Updated: 2010-09-08 21:54:54
    Listing title: Affiliate Marketing Journal - Security. Category: Privacy. Subcategory: informationItems in this feed:

  • Save on Sentry Safes: Security. Discount Safes, Fireproof Safes, Gun Safes

    Updated: 2010-09-08 21:54:53
    Listing title: Save on Sentry Safes: Security. Discount Safes, Fireproof Safes, Gun Safes. Category: Privacy. Subcategory: informationItems in this feed:Security Safe with 6 Level Key LockSentry Floor Safe

  • BigBlog.com: Computer Security

    Updated: 2010-09-08 21:54:53
    , , : What people are searching for : BigBlog.com : Computer Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 BigBlog.com : Computer Security The latest in Computer This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sat Jun 20 05:35:37 2009 Certified Ethical Hacker v5.0 If you have always wondered how attackers break into corporate networks , are considering moving into IT security , or a variety of systems and architectures . You 27 ll get in-depth knowledge with follow-along demos and hands-on . labs Iranian

  • Blue Box: The VoIP Security Podcast

    Updated: 2010-09-08 21:54:52
    , , : What people are searching for : Blue Box : The VoIP Security Podcast Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Blue Box : The VoIP Security Podcast A weekly podcast offering news , views and commentary on security issues for Voice Over IP and IP This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sun Jun 7 12:16:49 2009 Testing twitter integration with TypePad Just testing Twitter integration . I have a growing suspicion that TypePad only notifies Twitter if you write your Blue Box is now on Twitter . and new

  • Cisco Security Advisories

    Updated: 2010-09-08 21:54:51
    , , What people are searching for : Cisco Security Advisories Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 9.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Cisco Security Advisories Cisco Security Advisories the 40 most recent advisories Copyright : A9 1992-2009 Cisco Systems , Inc . All rights This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sun Jun 7 12:27:47 2009 CiscoWorks TFTP Directory Traversal Vulnerability Multiple Multicast Vulnerabilities in Cisco IOS Software Two crafted Protocol Independent Multicast PIM packet vulnerabilities exist in Cisco IOS

  • Latest Security, Tools entries at eCRM Product Guide

    Updated: 2010-09-08 21:54:50
    , , , What people are searching for : Latest Security , Tools entries at eCRM Product Guide Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 1.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 1.0 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Latest Security , Tools entries at eCRM Product Guide http : products.ecrmguide.com : IT Computer Hardware and Software Products Briefings and This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:55:19 2009 KRyLack Password Recovery Recovers passwords for ZIP , RAR , ACE archives KRyLack Password Recovery recovers lost passwords for ZIP , RAR and ACE archives Jun .

  • Global Security Watch

    Updated: 2010-09-08 21:54:50
    , , What people are searching for : Global Security Watch Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Global Security Watch Blogging about the triangle of Privacy , Encryption and This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:06:13 2009 Yahoo Phishing Hack Yahoo account password 124 TECHOTIPS TECHOTIPS Send Index.htm page of Phisher to victim in his inbox and ask him to login to his Yahoo tries to login to his Yahoo account by entering Yahoo password on our Phisher , you are able to hack Yahoo

  • An Introduction to OAuth 2.0

    Updated: 2010-09-07 22:29:29
    OAuth is a protocol that lets applications request data or privileges you have on a remote service without you having to provide your credentials for that service. A classic use case for this “valet key” system is contact import – you can let a site load your address book from Gmail without giving that site [...]

  • Quicktime and SCUP

    Updated: 2010-09-06 01:43:12
    When Quicktime 7.6.7 came out, I wanted to deploy it with Microsoft System Center Update Publisher (SCUP).   I’d recently used SCUP to deploy Flash (for IE) and the Dell Inventory Agent.   It made sense to look at using SCUP and SCCM Software Updates to deploy patches rather than continuing to use the old Software Distribution [...]

  • Fresh technology. Fresh attacks.

    Updated: 2010-09-03 04:55:13
    Teensy is an interesting device. Not much larger than a quarter, the technology behind it is comprised of a micro controller and other associated electronics (memory, I/O, etc). The result is a very functional, yet flexible, USB thingamabob that can let people program their own logic to run their own routines, commands, and instructions. Teensy [...]

  • SCUP Rule Testing

    Updated: 2010-09-03 01:50:27
    Microsoft System Center Update Publisher is a method to get third-party updates deployed through SCCM and an internal update server.   As I started working with it this summer, I had issues creating applicability rules.   When you create a collection in SCCM you get immediate feedback about the accuracy of your rules.   You either have the number of computers [...]

Current Feed Items | Previous Months Items

Aug 2010 | Jul 2010 | Jun 2010 | May 2010 | Apr 2010 | Mar 2010