Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, April 30, 2013
One Per Cent: Chinese 'water army' hijacks online product reviews
One Per Cent: Chinese 'water army' hijacks online product reviews: Looking for online product reviews before you buy holiday gifts? Watch your step. Many of those "user reviews" may come from professionals paid to post favourable comments about their employers' products and denigrate their competitors', says a computer scientist who worked undercover in the industry.
Thursday, April 25, 2013
Weirder Web | Tag Archive | Black Market Reloaded
Weirder Web | Tag Archive | Black Market Reloaded: Black Market Reloaded, the most visible competitor to Silk Road in the world of Tor marketplaces, grew to almost $400,000 in sales this month
Securing Your VPS Web Server Through Mod_Security
Securing Your VPS Web Server Through Mod_Security: Mod_security is an Apache web server module designed to spot and defend against intrusions into your web applications.
Samsung Delays Release of Security Software for Galaxy Phones - NYTimes.com
Samsung Delays Release of Security Software for Galaxy Phones - NYTimes.com: In February, Samsung Electronics introduced Knox, a version of Android with security features to make the company’s phones more suitable for businesses, expected for release this spring. But the company has delayed the release of the software until summer, according to two people briefed on the company’s plans.
Friday, April 19, 2013
WordPress.com adds 2-factor authentication option
WordPress.com adds 2-factor authentication option: "WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users."
'via Blog this'
'via Blog this'
Former Hostgator employee arrested, charged with rooting 2,700 servers | Ars Technica
Former Hostgator employee arrested, charged with rooting 2,700 servers | Ars Technica: "A former employee of Hostgator has been arrested and charged with installing a backdoor that gave him almost unfettered control over more than 2,700 servers belonging to the widely used Web hosting provider."
'via Blog this'
'via Blog this'
CISPA's Problem Isn't Bad PR, It’s Bad Privacy | American Civil Liberties Union
CISPA's Problem Isn't Bad PR, It’s Bad Privacy | American Civil Liberties Union: Creates an exception to all privacy laws to allow companies to share our personal information, including internet records and the content of emails, with the government and other companies, for cybersecurity purposes;
Wednesday, April 17, 2013
The GPS-Enabled DJI Phantom Quadcopter Makes The AR.Drone Look Like A Toy | TechCrunch
The GPS-Enabled DJI Phantom Quadcopter Makes The AR.Drone Look Like A Toy | TechCrunch: "The Phantom, which has a list price of $849 but currently retails for about $680, comes mostly pre-assembled and is extremely easy to fly, thanks to its built-in compass and GPS module"
'via Blog this'
'via Blog this'
Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites | Ars Technica
Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites | Ars Technica: "Tens of thousands of websites, some operated by The Los Angeles Times, Seagate, and other reputable companies, have recently come under the spell of "Darkleech," a mysterious exploitation toolkit that exposes visitors to potent malware attacks."
'via Blog this'
'via Blog this'
Apache Darkleech Compromises
Apache Darkleech Compromises: "Dubbed “Darkleech,” thousands of Web servers across the globe running Apache 2.2.2 and above are infected with an SSHD backdoor that allows remote attackers to upload and configure malicious Apache modules."
'via Blog this'
'via Blog this'
Tuesday, April 16, 2013
Brute Force Attacks Build WordPress Botnet — Krebs on Security
Brute Force Attacks Build WordPress Botnet — Krebs on Security: "the botnet of infected WordPress installations now includes more than 90,000 compromised sites."
'via Blog this'
'via Blog this'
INFILTRATE - Security Conference // Home
INFILTRATE - Security Conference // Home: "INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. "
'via Blog this'
'via Blog this'
What 420,000 insecure devices reveal about Web security | Security & Privacy - CNET News
What 420,000 insecure devices reveal about Web security | Security & Privacy - CNET News: Using a simple technique, a researcher creates a benign botnet to survey the breadth of the Internet, and finds a back door flung wide open and beckoning the bad guys.
Monday, April 15, 2013
Boston Marathon Aid: How You Can Help, And Scams To Avoid
Boston Marathon Aid: How You Can Help, And Scams To Avoid: "Of course, the scam artists know this and have already set up phony donation links to trick good-hearted people out of their hard-earned dollars."
'via Blog this'
'via Blog this'
Saturday, April 13, 2013
Decoding Biology of Blood Disorders Leads to New Therapies
Decoding Biology of Blood Disorders Leads to New Therapies:
"Iron control is regulated, first and foremost, by hepcidin or Hamp"
'via Blog this'
"Iron control is regulated, first and foremost, by hepcidin or Hamp"
'via Blog this'
Friday, April 12, 2013
To Tibet, with Love | The Official Lookout Blog
To Tibet, with Love | The Official Lookout Blog: On March 25th 2013, the email account of a Tibetan activist was hacked and used to spearphish all the contacts in his address book.
Bing Delivers Five Times as Many Malicious Websites as Google
Bing Delivers Five Times as Many Malicious Websites as Google: Searches on Bing returned five times more links to malicious websites than Google searches, according to an 18-month study from German independent testing lab AV-Test.
Monday, April 8, 2013
Ira Winkler on why cybersecurity degrees are worthless
Ira Winkler on why cybersecurity degrees are worthless: But does a college degree have the same value as a certification? According to security expert Ira Winkler, it does not.
Sunday, April 7, 2013
How to Move Your Blog from WordPress to Blogger
How to Move Your Blog from WordPress to Blogger: Moving a blog from WordPress to Blogger is actually fairly simple as long as you've got administrative access to your WordPress blog.
Saturday, April 6, 2013
CSIS: 20 Critical Security Controls
CSIS: 20 Critical Security Controls: The Twenty Critical Security Controls have already begun to transform security
Wednesday, April 3, 2013
Forensics Analysis of Mandiant’s APT1 Report | Malware Analysis
Forensics Analysis of Mandiant’s APT1 Report | Malware Analysis: I don’t find sufficient evidence from the APT1 Report to proof the hypothsis-2 that:
APT1 is Unit 61398.
APT1 is Unit 61398.
Tuesday, April 2, 2013
CSIS: 20 Critical Security Controls
CSIS: 20 Critical Security Controls: The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through.
Voluntary National Insurance contributions - GOV.UK
Voluntary National Insurance contributions - GOV.UK: The table explains who is eligible to pay voluntary National Insurance contributions and which class to pay
Subscribe to:
Posts (Atom)