Tuesday, April 30, 2013

One Per Cent: Chinese 'water army' hijacks online product reviews

One Per Cent: Chinese 'water army' hijacks online product reviews: Looking for online product reviews before you buy holiday gifts? Watch your step. Many of those "user reviews" may come from professionals paid to post favourable comments about their employers' products and denigrate their competitors', says a computer scientist who worked undercover in the industry.

Thursday, April 25, 2013

Weirder Web | Tag Archive | Black Market Reloaded

Weirder Web | Tag Archive | Black Market Reloaded: Black Market Reloaded, the most visible competitor to Silk Road in the world of Tor marketplaces, grew to almost $400,000 in sales this month

Securing Your VPS Web Server Through Mod_Security

Securing Your VPS Web Server Through Mod_Security: Mod_security is an Apache web server module designed to spot and defend against intrusions into your web applications.

Samsung Delays Release of Security Software for Galaxy Phones - NYTimes.com

Samsung Delays Release of Security Software for Galaxy Phones - NYTimes.com: In February, Samsung Electronics introduced Knox, a version of Android with security features to make the company’s phones more suitable for businesses, expected for release this spring. But the company has delayed the release of the software until summer, according to two people briefed on the company’s plans.

Friday, April 19, 2013

WordPress.com adds 2-factor authentication option

WordPress.com adds 2-factor authentication option: "WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users."

'via Blog this'

Former Hostgator employee arrested, charged with rooting 2,700 servers | Ars Technica

Former Hostgator employee arrested, charged with rooting 2,700 servers | Ars Technica: "A former employee of Hostgator has been arrested and charged with installing a backdoor that gave him almost unfettered control over more than 2,700 servers belonging to the widely used Web hosting provider."

'via Blog this'

CISPA's Problem Isn't Bad PR, It’s Bad Privacy | American Civil Liberties Union

CISPA's Problem Isn't Bad PR, It’s Bad Privacy | American Civil Liberties Union: Creates an exception to all privacy laws to allow companies to share our personal information, including internet records and the content of emails, with the government and other companies, for cybersecurity purposes;

Wednesday, April 17, 2013

The GPS-Enabled DJI Phantom Quadcopter Makes The AR.Drone Look Like A Toy | TechCrunch

The GPS-Enabled DJI Phantom Quadcopter Makes The AR.Drone Look Like A Toy | TechCrunch: "The Phantom, which has a list price of $849 but currently retails for about $680, comes mostly pre-assembled and is extremely easy to fly, thanks to its built-in compass and GPS module"

'via Blog this'

Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites | Ars Technica

Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites | Ars Technica: "Tens of thousands of websites, some operated by The Los Angeles Times, Seagate, and other reputable companies, have recently come under the spell of "Darkleech," a mysterious exploitation toolkit that exposes visitors to potent malware attacks."

'via Blog this'

Apache Darkleech Compromises

Apache Darkleech Compromises: "Dubbed “Darkleech,” thousands of Web servers across the globe running Apache 2.2.2 and above are infected with an SSHD backdoor that allows remote attackers to upload and configure malicious Apache modules."

'via Blog this'

Tuesday, April 16, 2013

Brute Force Attacks Build WordPress Botnet — Krebs on Security

Brute Force Attacks Build WordPress Botnet — Krebs on Security: "the botnet of infected WordPress installations now includes more than 90,000 compromised sites."

'via Blog this'

INFILTRATE - Security Conference // Home

INFILTRATE - Security Conference // Home: "INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. "

'via Blog this'

What 420,000 insecure devices reveal about Web security | Security & Privacy - CNET News

What 420,000 insecure devices reveal about Web security | Security & Privacy - CNET News: Using a simple technique, a researcher creates a benign botnet to survey the breadth of the Internet, and finds a back door flung wide open and beckoning the bad guys.

Friday, April 12, 2013

To Tibet, with Love | The Official Lookout Blog

To Tibet, with Love | The Official Lookout Blog: On March 25th 2013, the email account of a Tibetan activist was hacked and used to spearphish all the contacts in his address book.

Bing Delivers Five Times as Many Malicious Websites as Google

Bing Delivers Five Times as Many Malicious Websites as Google: Searches on Bing returned five times more links to malicious websites than Google searches, according to an 18-month study from German independent testing lab AV-Test.

Monday, April 8, 2013

Ira Winkler on why cybersecurity degrees are worthless

Ira Winkler on why cybersecurity degrees are worthless: But does a college degree have the same value as a certification? According to security expert Ira Winkler, it does not.

Sunday, April 7, 2013

How to Move Your Blog from WordPress to Blogger

How to Move Your Blog from WordPress to Blogger: Moving a blog from WordPress to Blogger is actually fairly simple as long as you've got administrative access to your WordPress blog.

Saturday, April 6, 2013

Wednesday, April 3, 2013

Tuesday, April 2, 2013

CSIS: 20 Critical Security Controls

CSIS: 20 Critical Security Controls: The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through.

Voluntary National Insurance contributions - GOV.UK

Voluntary National Insurance contributions - GOV.UK: The table explains who is eligible to pay voluntary National Insurance contributions and which class to pay