Monday, June 3rd, 2013
When it comes to threats to mobile devices, most people don't think of chargers as a likely point of attack. But plugging in an iPhone — or any smartphone or tablet — could come at a price.
At next month's Black Hat security conference in Las Vegas, three Georgia Institute of ...
Posted in Hardware, Privacy, Security | No Comments
Saturday, May 25th, 2013
As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from The MITRE Corp. say ...
Posted in Hardware, Security | No Comments
Wednesday, May 15th, 2013
Microsoft’s Internet Explorer 10 is better at blocking malware downloads than rivals Chrome, Firefox, Safari and Opera thanks to superior URL and application reputation technology, a new test by NSS Labs has found.
Browser security has been getting more and more layered and complex. How it works and whether it works ...
Posted in Internet, Privacy, Security, Windows | No Comments
Tuesday, May 7th, 2013
Security firm Trend Micro has seen an uptick in AutoIT-based malware thanks to the fact that it’s an easy-to-learn language that allows for quick development. It enables everything from simple scripts that change text files to scripts that perform mass downloads with complex GUIs. One commonly seen nefarious AutoIT tool ...
Posted in Coding, Internet, Security, Software, Windows | No Comments
Tuesday, May 7th, 2013
Your hard drive crashes. You hit “Save” without thinking and an important version is overwritten and lost forever. Someone accidentally deletes all the wedding pics. You restore an infected file to your new computer and end up having to start all over again.
Stuff happens.
Having a backup is a good idea. ...
Posted in Internet, Security | No Comments