Computerworld - Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics...
SelengkapnyaComputerworld - Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service companies via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks...
SelengkapnyaIDG News Service - A critical vulnerability found in a WordPress plug-in that has been downloaded over 1.7 million times allows potential attackers to take complete control of blogs that use it...
SelengkapnyaSummary: This vulnerability affects: Adobe Flash Player 13.0.0.214 and earlier, running on all platforms (and Air)...
SelengkapnyaAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server...
Selengkapnya"Arbor Networks’ ASERT has recently discovered a new malware family that combines several techniques to steal payment card information. Dubbed Soraya, meaning “rich,” this malware uses memory scraping techniques similar to those found in Dexter to target point-of-sale terminals...
Selengkapnya"The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal...
Selengkapnya''...Tumblr announced this week that it was adding new security measures to the Settings page of the app. Two-factor authentication is optional for users and when activated the user will need a password and an authentication code...''
SelengkapnyaHistorically, 80 per cent of hackers were ?freelance? and just 20 per cent were part of organised crime,? Mark Quartermaine, VP for UK and Ireland at Juniper Networks, told IT Pro.
SelengkapnyaThe fact is that the traditional way of policing cybercrime has not been working. Only a fraction of cybercrime and fraud now reported to the Action Fraud centre is ever referred on to a police force, so thousands of victims a year do not so much as hear from an officer.
Selengkapnya