Monday, May 5th, 2008
Nowadays, who understands Di-Di-Di-Da-Da-Da-Di-Di-Dit (S.O.S., Save Our Souls)? Few people do, but your web browser just might. In his blog, security expert Nathan McFeters has reported the discovery of a cross-site scripting (XSS) vulnerability on an Italian website that allows attackers to inject malicious JavaScript encoded in Morse code in ...
Posted in Coding, Internet, Privacy, Security | No Comments
Thursday, May 1st, 2008
Security's rising star, Webroot, plans to offer web and malware filtering as a service to SMBs, the first vendor of any size to offer such a capability in subscription form.
The software-as a service (SaaS) model, which extends the email filtering service already offered by the company, will appeal to smaller ...
Posted in Internet, Privacy, Security, Software | No Comments
Wednesday, April 30th, 2008
This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited Information Technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity. Although the information in this document may ...
Posted in Internet, Linux, Privacy, Security, Windows | No Comments
Monday, April 28th, 2008
Two vulnerabilities have been reported in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and to compromise a vulnerable system.
1) A vulnerability is caused due to improper access restriction of the administration section. This can be exploited to bypass the authentication ...
Posted in Coding, Internet, Security, Software | No Comments
Saturday, April 26th, 2008
It works seamlessly with any hardware and operating system combination supporting USB keyboards such as Windows, MacOS, Linux and others. The Key generates and sends unique time-variant authentication codes by emulating keystrokes through the standard keyboard interface. The computer to which the Key is attached receives this authentication code character ...
Posted in Hardware, Privacy, Security | No Comments