• Woman sues after firm tracking stolen laptop records nude video chats

    Updated: 2011-08-31 17:11:10
    Imagine the scene: you buy a second-hand laptop and use it to, among other things, have secret sexy video chats with your significant other. Unbeknownst to you, naked photos of you are being taken by a company hired to track down the stolen laptop. Ouch. Read more…

  • Western Union money transfer email disguises Trojan attack

    Updated: 2011-08-31 11:26:16
    Is Western Union trying to deliver money to you? Or is a malware author trying to infect your Windows computer? Read more…

  • Apache 2.2.20 released to fix DoS vulnerability

    Updated: 2011-08-31 07:25:13
    The Apache Foundation has released version 2.2.20 to address a denial of service vulnerability. Web admins using Apache should update as soon as possible. Read more…

  • Google blacklists 247 certificates. Is it related to DigiNotar hacking incident?

    Updated: 2011-08-31 03:25:02
    Google has blacklisted over 200 certificates seemingly related to the DigiNotar hacking incident. What is the full extent of this breach, and who else may have been targeted? Read more…

  • Certification Authorities Behaving Badly

    Updated: 2011-08-30 15:59:06
    Another case of a certification authority (CA) issuing a certificate they never should have has surfaced. You may remember when we discussed the Comodo incident earlier this year. Now, a certificate issued by DigiNotar has surfaced in the wild, being valid for *.google.com – meaning it could be used to secure any transaction with any [...]

  • And when the police come knocking, then what?

    Updated: 2011-08-29 18:00:55
    When contracting with a data center, we ask plenty of questions. We ask about their security posture. Do they monitor entrances and exits? Do they police building parking? How is their alarm system monitored? How secure is their network? Are the cages secure? Who can get into the building? We ask about their ability to [...]

  • ESET Faces U.S. Sanctions for Assisting Iran

    Updated: 2011-08-27 18:52:01
    An article in Thursday’s Washington Times reports that an employee security firm ESET discovered its software was being used on tens of thousands of computers in Iran.  This may be a violation of the sanctions on Iran.  Ignored by executives at Eset this whistleblower documented and reported his concerns to the Secret Service.  The whistleblower was fired by ESET.  ESET [...]

  • Advanced Persistent Threat Blog Central

    Updated: 2011-08-26 17:30:26
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive August 2011 32 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 387 Corporate 214 Enterprise 379 McAfee Labs 1092 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom

  • Infosec on Suits (USA Network)

    Updated: 2011-08-26 04:18:12
    Suits is a show on USA Networks,  kind of like White Collar, but set at a law firm. On the show, Mike Ross is a first year lawyer, and he just can’t seem to learn computer security.   I’ve marveled at his inability to learn the need for a screensaver lock, or better yet lock the [...]

  • Kingsoft Internet Security released the Kingsoft PC doctor

    Updated: 2011-08-25 10:12:58
    25th, August, 2011 from KSOffice Team Kingsoft Security has released a new computer security product which can intensively scan a Windows computer to detect and remove malware, using Kingsoft Cloud Security Engine and Kingsoft V10 Antivirus Engine, patch Windows vulnerability, clean junk files and optimize Windows to improve performance. While this might all sound very familiar, [...]

  • Security Tips from Australia’s DSD

    Updated: 2011-08-24 04:54:31
    Sometimes it can be a daunting task to keep up with computer security best practices, especially when it comes to prevention. There is an almost unlimited amount of things to take into account, not to mention significant decisions on which risks you need to address and which aren’t worth the effort. In addition, many different [...]

  • DEFCON Paranoia

    Updated: 2011-08-19 01:55:33
    Just because you’re paranoid doesn’t mean they aren’t out to get you. Before going out to DEFCON, I saw a couple of posts/articles on staying safe at DEFCON.  Since DEFCON, I’ve seen several people say they wouldn’t bring a computer to DEFCON or they used a bootable disk with a SSH tunnel back to their [...]

  • How to keep using Kingsoft Office 2010 old version without update

    Updated: 2011-08-15 11:49:56
    15th, August, 2011 from KSOffice Team Currently many of Kingsoft Office Users faced one activate issue for the Kingsoft Office 2010, when you run any application of Kingsoft Office, built-in default setting are used and software will check for online update. Then after you install the update package and update to the version of 6.6.0.2496. Maybe [...]

  • How to keep using Kingsoft Office 2010 old version 2477

    Updated: 2011-08-15 11:43:00
    15th, August, 2011 from KSOffice Team Currently many of Kingsoft Office Users faced one activate issue for the Kingsoft Office 2010, when you run any application of Kingsoft Office, built-in default setting are used and software will check for online update. Then after you install the update package and update to the version of 6.6.0.2496. Maybe [...]

  • P0ned by Copier, Again

    Updated: 2011-08-13 03:00:47
    At DEFCON, Deral Heiland spoke on leveraging multifunction printers during pentesting.  I’d previously seen him speak on this at Shmoocon 2011.  Multifunction copiers are barely managed in most companies.   They have default passwords, and don’t get patched.   Passwords are saved on the device to access network shares or LDAP.  In some cases these passwords are exposed by the copier.    [...]

  • History and Evolution of Viruses

    Updated: 2011-08-12 05:11:35
    At DEFCON, Mikko Hyponnen spoke on the History and evolution of computer viruses.   To a certain point, the talk reminded me of George C Smith’s book Virus Creation Labs.   Also depending on when you started in computers, you’ll have your own memories.   I ran into Happy99 a lot while doing dialup tech support.   Before that, in [...]

  • DEFCON 19

    Updated: 2011-08-11 21:23:38
    I went to DEFCON 19 this year, and finally have some time to post some thoughts.   You’ll probably see an annoying flurry of posts on each talk. This is my first year at DEFCON.   I felt like DEFCON is one of those things I had to do at least once.   I had a great time.   [...]

  • Kingsoft Office 2010 Tea Party in BCS Computer City of Bangladesh

    Updated: 2011-08-09 07:38:51
    9th, August, 2011 from KSOffice Team Kingsoft Office which is Unrivaled compatible with Microsoft Office® (include 2007 version) ,Cost-Effective, Easy-to-Use and it already has 10,000,000 + Active Users in the world. The latest version 2010 is fast ( Speed is faster than pervious version more than 10 times more ), small size ( only 50 MB), [...]

  • Arun Sabapathy Blog Central

    Updated: 2011-08-06 19:16:18
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive August 2011 10 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 378 Corporate 210 Enterprise 373 McAfee Labs 1089 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime data breach

  • True Names

    Updated: 2011-08-06 04:27:36
    What’s in a name if it’s transparent? The concept of a “name” has always been an important part of interactivity due to the convenience of association. We use names to keep people and things distinct when we reference them. Beyond that, their significance can be magnified by the value we place on them (e.g. exorcisms, [...]

  • Encrypt your portable devices

    Updated: 2011-08-04 21:45:47
    I just recently bought a new netbook. Now, I know that netbooks are supposedly on the way out, but I love the low price, long battery life, and massive portability. But there’s a problem with netbooks and security. They’re massively portable – whether the person doing the porting is me or a thief. I do [...]

  • SMS messages unlocking a car

    Updated: 2011-08-04 15:59:56
    Black Hat Briefings have been going on all this week, with the expected announcements of vulnerabilities, tools, and other fun. I refuse to go to Vegas for health reasons, so I often miss out on Black Hat and Defcon. But this week, the one announcement that has me interested is that SMS messages are being [...]

Current Feed Items | Previous Months Items

Jul 2011 | Jun 2011 | May 2011 | Apr 2011 | Mar 2011 | Feb 2011