Sunday, April 13th, 2008
Apple is quietly adding several key anti-hacker security features into its flagship QuickTime media player as part of a deliberate plan to reduce the effectiveness of malicious exploits.
The XPMs (exploit prevention mechanisms) have been fitted into the WIndows and Mac OS X versions of QuickTime 7.4.5, a new update that ...
Posted in Security, Software, Windows | No Comments
Sunday, April 13th, 2008
Cybercriminals have created a global business with a supply chain every bit as organized and sophisticated as that of any legitimate business. The difference is that cybercrime takes advantage of unsuspecting consumers and insecure businesses to steal untold amounts of money.
According to security experts and spam fighters speaking at a ...
Posted in Internet, Privacy, Security | No Comments
Saturday, April 12th, 2008
The world has a new culprit to blame for the rising tide of software vulnerabilities -- code outsourcing.
The trend to outsource the coding of applications is now a major contributor to making business software more vulnerable, a survey-cum-report has claimed.
According to analyst group Quocirca, which surveyed 250 IT directors and ...
Posted in Coding, Internet, Security, Software | No Comments
Saturday, April 12th, 2008
If you're running Windows Vista, you're familiar with User Access Control (UAC). It's the security subsystem that pops up those irritating dialog boxes asking whether you really want to install software, or modify system files, or write to the Registry.
UAC may be Vista's most-hated feature, but as it turns out, ...
Posted in Internet, Security, Windows | No Comments
Saturday, April 12th, 2008
Threats against browsers are getting more sophisticated and branching out into such exotic areas as gaming, experts told attendees at the recent RSA Conference 2008.
New attacks from games and virtual-world Web sites can deliver bot-like control of browsers to attackers, said Ed Skoudis, a security consultant with Intelguardians, speaking at ...
Posted in Coding, Internet, Privacy, Security | No Comments