Tuesday, August 25th, 2009
Sub7, or SubSeven or Sub7Server, is the name of a popular backdoor program. It is mainly used for causing mischief, such as hiding the computer cursor, changing system settings or loading up pornographic websites. However, it can also be used for more serious criminal applications, such as stealing passwords and ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Friday, August 14th, 2009
Google security specialists Tavis Ormandy and Julien Tiennes report that a critical security vulnerability in the Linux kernel affects all versions of 2.4 and 2.6 since 2001, on all architectures. The vulnerability enables users with limited rights to get root rights on the system. The cause is a NULL pointer ...
Posted in Linux, Security | No Comments
Monday, August 3rd, 2009
Security researchers have found some serious flaws in software that uses the SSL (Secure Sockets Layer) encryption protocol used to secure communications on the Internet.
At the Black Hat conference in Las Vegas on Thursday, researchers unveiled a number of attacks that could be used to compromise secure traffic travelling between ...
Posted in Internet, Privacy, Security | No Comments
Sunday, August 2nd, 2009
Criminals running an ATM card-skimming scam made a big mistake this week: They tried to hit the Defcon hacker conference in Las Vegas.
As the conference was kicking off a few days ago, attendees noticed that at ATM placed in the Riviera Hotel, which plays host to the annual event, didn't ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Friday, July 31st, 2009
A pair of computer security researchers have discovered a BIOS vulnerability caused by the Computrace Laptop Lojack software, serving as a rootkit to potentially let malware nest and thrive in an estimated 60% of newish laptops.
The research team of Alfredo Ortega and Anibal Sacco say that when malware infects a ...
Posted in Hardware, Privacy, Security, Software | No Comments