Wednesday, April 16th, 2008
For years, hackers have focused on finding bugs in computer software that give them unauthorised access to computer systems, but now there's another way to break in: hack the microprocessor.
Researchers at the University of Illinois at Urbana-Champaign demonstrated how they altered a computer chip to grant attackers back-door access to ...
Posted in Hardware, Privacy, Security | 1 Comment
Tuesday, April 15th, 2008
If you don't have security software, your PC is an Internet mugging waiting to happen. We show you the eleven best pieces of software for defending yourself against online thugs.
The PC security landscape is constantly changing. Well paid, malicious programmers keep cranking out new and different attacks, and the security ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Tuesday, April 15th, 2008
Is your company's Web site hacked? Today, it can be hard to tell. Online crooks who successfully break into a site often sneak in small bits of code that leave no visible trace but can attack visitors who simply view the page.
In fact, according to a Websense Security Labs report, online thugs who want ...
Posted in Coding, Internet, Networking, Privacy, Security | No Comments
Tuesday, April 15th, 2008
Panos Anastassiadis didn't click on the fake subpoena that popped into his inbox on Monday morning, but he runs a computer security company. Others were not so lucky.
In fact, security researchers say that thousands have fallen victim to an email scam in which senior managers such as Anastassiadis are told ...
Posted in Internet, Privacy, Security | No Comments
Monday, April 14th, 2008
Security service provider Secunia has discovered a vulnerability in the ClamAV open source virus scanner. Attackers can foist code on the appliction using manipulated EXE files.
According a Secunia advisory, a boundary error in the cli_scanpe() function in libclamav/pe.c can cause a heap-based buffer overflow. Manipulated PE executables (Windows .exe files) ...
Posted in Coding, Security, Software | No Comments