A federal Judge has extended the date to cut off computers affected with the DNSChanger malware from the internet.

For those unaware, DNSChanger is a malware that replaces the default DNS servers of the infected computers with rogue DNS servers. It is believed that around four million computers were infected by this malware .

Read More

 

Adobe has released an update to its Adobe Flash and Shockwave Player, as there were critical vulnerabilities found in both the products. The vulnerabilities were found by two Google’s security team members and reported the same to the Adobe. The vulnerabilities – integer error and memory corruption – could have been used by hackers to take advantage of it and completely control the computers that are affected by it.

Read More

 

The White House has drafted a set of guidelines for good practices by companies regarding consumer’s privacy. The Consumer Data Privacy in a Networked World document lays down several points that need to be maintained by companies for customer satisfaction. Read on to find out more!

Read More

 

Today, Wikileaks went live with staggered posts of over five thousand emails from STRATFOR, much of which has to do with the company’s attempt to show “privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks”, as stated by RWW. Many of these emails also show how STRATFOR has engaged in malpractice in the name of security consulting.

Read More

 

clip_image002

Phishing is a popular method of social engineering employed by scammers. A scammer posing as someone else uses popular communication medium such as email or telephone to contact a victim and request confidential information. This information is used for purposes such as withdrawing money illegally from the victim’s account or even identity thefts.

Identifying a phishing email is easy if you keep in mind certain basic fine points.

Read More

 

When Symantec tried to play the hacker Yama Tough, who claims to have the code, he got impatient and released the code online on 6 February. After analyzing the leaked code, Symantec has declared that it is a five-year-old code, and its patches are enough to keep users safe.

Read More

 

Not only has Kelihos started showing back on the radar, it is using new encryption techniques to hide its communications. A researcher at Kaspersky has also noted that two different RSA keys are being used; indicating that there might be two different groups controlling Kelihos.

Read More

 

Slew of Websites Black Out to Protest SOPA/PIPA

The scourges that are the United States’ two gagging Acts – the Stop Online Privacy Act (SOPA) and the PROTECT IP Act (PIPA) – are experiencing grave turmoil as large sections of the widely used Internet are blacking out for one day in protest against their draconian nature. The ongoing protest against the Bills intensified as Wikipedia, a veritable behemoth on the Internet, joined in the protest as we mentioned earlier. Following close on its heels is the giant community link aggregation website Reddit as well as the website of indie game maker Mojang, the creators of Minecraft. Many other gaming company heads joined together to stand against the draconian law’s enactment.

Read More

 

Symantec has now retracted its previous statement that the security breach which led to the leak of source codes of their older security products happened at a third part server, reports Reuters.

Read More

 

Zappos

Zappos, an online retailer run by Amazon has suffered a security breach and has confirmed that its customer information was accessed.

Read More

 

huffpost_hacked

Twitter accounts of Huffington Post and actor Ashton Kutcher were hacked and objectionable tweets were posted.

Read More

 

cover_it_live

In an email send to its customers, CoveritLive revealed that there was a security breach and some information (i.e., user names, email addresses and/or passwords) were accessed.

Read More

 

symantec

Symantec today confirmed that source code of two of its old enterprise products were obtained by hackers. The hack is assumed to be the work of an Indian group who calls themselves Lords of Dharmaraja.

Read More

 

Google Chrome Vulnerable to Secure Address Bar Spoofing

Security researchers show off HTTPS URL spoofing on Chrome 14/15.

Read More

 

spam

According to a recent report from Internet security company Kaspersky Labs, India has become the top source of spam emails for the third quarter of 2011.

Read More

 

1 2 3 4 5 6 7 8 9 10 12
 
Copyright 2006-2012 Techie Buzz. All Rights Reserved. Our content may not be reproduced on other websites. Content Delivery by MaxCDN