Monday, July 26th, 2010
Security experts at AirTight Networks have discovered a hole in the WPA2 Wi-Fi security protocol. The security hole was named as Hole 196 after the number of the relevant page in the IEEE 802.11 (2007) standard document:. Right at the bottom of this page, the IEEE introduces the keys used ...
Posted in Internet, Networking, Privacy, Security | No Comments
Sunday, June 6th, 2010
A critical vulnerability exists in Adobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems, and the authplay.dll component that ships with Adobe Reader and Acrobat 9.x for Windows, Macintosh and UNIX operating systems. This vulnerability (CVE-2010-1297) could cause a crash and potentially allow an ...
Posted in Internet, Security | No Comments
Sunday, May 9th, 2010
In September 2007, we have published an article about a great disease that affected tens of Windows security products. The article called Plague in (security) software drivers revealed awful quality of kernel mode drivers installed by all the major desktop security products for Windows. The revealed problems could cause random ...
Posted in Internet, Security, Software, Windows | No Comments
Wednesday, April 28th, 2010
IronKey has launched its Trusted Access for Banking USB stick at InfoSec 2010 in London. The IronKey TAB uses an isolated virtual machine launched from the stick and a intermediate server accessed through a VPN like connection to create a secure channel from the user to IronKey's servers, and from ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, April 7th, 2010
For consumers, open up the Preferences panel and click on "Trust Manager" in the left pane. Clear the check box "Allow opening of non-PDF file attachments with external applications".
For administrators who wish to accomplish this with a registry setting on Windows, add the following DWORD value to:
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\\Originals
Name: bAllowOpenFile
Type: REG_DWORD
Data: ...
Posted in Internet, Security, Software | 1 Comment