7 Reasons Websites Are No Longer Safe

Wednesday, September 9th, 2009

Conventional wisdom is that Web wanderers are safe as long as they avoid sites that serve up pornography, stock tips, games and the like. But according to recently gathered research from Boston-based IT security and control firm Sophos, sites we take for granted are not as secure as they appear.Among ...

Hole in Windows Vista and 7 allows remote reboot

Tuesday, September 8th, 2009

A vulnerability in Microsoft's implementation of the SMB2 protocol can be exploited via the net to crash or reboot Windows Vista and Windows 7 systems. The root of the problem is an error in how the srv2.sys driver handles client requests when the header of the "Process Id High" field ...

The dark side of open source software is Stoned

Monday, September 7th, 2009

A rootkit is a piece of software which, for nefarious purposes, aims to run undetected on your computer. It will hide itself from process listings and will seek to interfere with the ordinary running of your system to fulfil its own purposes.A bootkit is a particular type of rootkit which ...

Amazon Web Services launches two factor authentication

Monday, September 7th, 2009

Protecting the management account for cloud services can be one of the most critical security points of a cloud-based solution. Arguably, the account is more important than instance and operating system security for cloud workloads. Amazon web services (AWS) has recently introduced a new feature, Amazon web services multi-factor authentication ...

How to Keep WordPress Secure

Saturday, September 5th, 2009

A stitch in time saves nine. I couldn’t sew my way out of a bag, but it’s true advice for bloggers as well — a little bit of work on an upgrade now saves a lot of work fixing something later.Right now there is a worm making its way around ...