Wireless Security Gets Boost From New Round of Products

Wednesday, April 16th, 2008

Wireless security vendors used last week's conference here to showcase both the problems and solutions in controlling access to wireless voice and data. AirTight Networks launched SpectraGuard Online, touted as wireless security's first manifestation of the software-as-a-service (SaaS) model that more vendors -- and a few cyber criminals -- are using.  In ...

‘Pro-Tibet’ Rootkit Attacks Windows PCs

Wednesday, April 16th, 2008

A cartoon that ridicules the efforts of a Chinese gymnast at the Olympic games is the latest ploy used by cyber-criminals to infect Windows PCs, according to McAfee Avert labs. While the movie files, which show the cartoon followed by images supporting a free Tibet, are playing, a keystroke logging tool, ...

Hacker releases working GDI-bug attack code

Wednesday, April 16th, 2008

Security researchers on Monday spotted malicious code that triggers a critical vulnerability in the Chinese version of Windows 2000, and warned users of other editions to expect attacks. Symantec confirmed that the proof-of-concept code publicly posted to the milw0rm.com site earlier in the day successfully attacks Chinese editions of Windows 2000 ...

ISPs accused of tampering with web pages

Wednesday, April 16th, 2008

About one percent of the Internet web pages are being changed in transit, sometimes in a harmful way, according to researchers at the University of Washington. In a paper, set to be delivered Wednesday, the researchers document some troubling practices. In July and August they tested data sent to about 50,000 ...

Researchers uncover undetectable chip hack

Wednesday, April 16th, 2008

For years, hackers have focused on finding bugs in computer software that give them unauthorised access to computer systems, but now there's another way to break in: hack the microprocessor. Researchers at the University of Illinois at Urbana-Champaign demonstrated how they altered a computer chip to grant attackers back-door access to ...