Sunday, April 6th, 2008
When it comes to being taken in by Internet fraudsters, men have a knack for losing cash, according to a new report from the Internet Crime Complaint Center.
Data compiled from more than 206,000 complaints received last year by the U.S. Internet Crime Complaint Center (IC3) shows that men lost US$1.67 ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 3rd, 2008
New Additions
Target-Based support to allow rules to use an attribute table describing services running on various hosts on the network. Eliminates reliance on port-based rules.
Support for GRE encapsulation for both IPv4 & IPv6.
Support for IP over IP tunneling for both IPv4 & IPv6.
SSL preprocessor to allow ability to not inspect ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Thursday, April 3rd, 2008
Spammers are once again using web bugs to verify the validity of of email addresses. This time the trick is not done with graphics but with digital certificates. Alexander Klink from German consultants Cynops has discovered a vulnerability in Microsoft products – or possibly in the Crypto API – that ...
Posted in Coding, Internet, Privacy, Security | No Comments
Wednesday, April 2nd, 2008
A British security researcher has demonstrated a "biologging" system for intercepting biometric authentication data, warning that attacks on biometric systems could become relatively straightforward if current practices don't change.
Matthew Lewis, of London-based Information Risk Management, demonstrated a proof-of-concept biologger last week at Black Hat Amsterdam and released the tool's source ...
Posted in Hardware, Privacy, Security | No Comments
Wednesday, April 2nd, 2008
Around a tenth of all malware is designed to use portable storage media, such as removable USB drives, as an attack and spread vector.
Security firm ESET said that 10.3 per cent of malware detections last month were identified as files containing information on programs to be run automatically when removable ...
Posted in Hardware, Internet, Privacy, Security | No Comments