Thursday, May 8th, 2008
It takes the average attacker less than 10 seconds to hack in and out of a database -- hardly enough time for the database administrator even notice the intruder. So it’s no surprise that many database attacks go unnoticed by organizations until long after the data has been compromised.
And surprisingly, ...
Posted in Internet, Security | No Comments
Wednesday, May 7th, 2008
A loyal ISC reader, Rob, wrote in to point us at what looks to be a SQL Injection worm that is on the loose. From a quick google search it shows that there are about 4,000 websites infected and that this worm started at least mid-April if not earlier. Right ...
Posted in Coding, Internet, Privacy, Security | No Comments
Tuesday, May 6th, 2008
Adware pushers have found a new way to trick you into downloading their annoying products: fake MP3 files.
On Tuesday, security vendor McAfee reported that it's seen a huge spike in fake MP3 files spreading on peer-to-peer networks. Although the files have names that make them look like audio recordings, they're ...
Posted in Privacy, Security | No Comments
Tuesday, May 6th, 2008
You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage?
A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they ...
Posted in Hardware, Privacy, Security | No Comments
Monday, May 5th, 2008
This is a pretty new tool and a very cool one, Hibernation is a fairly new feature for Windows so it’s good to see a new tool targeting that.
Microsoft provides a feature called Hibernation also know as suspend to disk that aims to save the system state into an undocumented ...
Posted in Privacy, Security, Windows | No Comments