Free Republic 2nd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $81,787
100%
Woo hoo!! OVER THE TOP!! Congratulations everyone!! God bless.

Keyword: computersecurity

Brevity: Headers | « Text »
  • Starting InfoSec - an Information Security, Warfare, and Privacy ping list [Vanity]

    05/28/2004 12:55:59 AM PDT · by adam_az · 18 replies · 123+ views
    5/28/04 | adam_az
    I am starting a ping list for people interested in Information Security, Information Warfare, and Information Privacy issues. What this list isn't: Don't expect this to be a replacement for Bugtraq, etc... I'm not going to post the dozens of vulnerabilities that are discovered each week. Don't expect subscribing to be an alternative to keeping your PC's patches up to date. What this list is: News articles about information security issues, ranging from information warfare to serious virus/worm warnings, identity theft, privacy laws, lawsuits, spam, hoaxes, etc. Some of the articles may be technical, some will be more policy oriented....
  • Symantec Scrambles to Fix Firewall Flaws (for Norton users)

    05/13/2004 4:03:11 PM PDT · by JoJo Gunn · 60 replies · 1,426+ views
    InternetNews.com ^ | May 13, 2004 | Ryan Naraine
    Computer security specialist Symantec Thursday moved swiftly to patch for four very serious vulnerabilities in its popular Norton firewall product suite. An alert from Cupertino, Calif.-based Symantec described the flaws as "high risk" and warned that a successful exploit could wipe out a user's computer. Attackers could also execute remote code with kernel-level privileges on the targeted system. The vulnerabilities, first discovered by researchers at eEye Digital Security, affect both enterprise and consumer Norton users. Affected products include the Symantec Client Firewall 5.01 and 5.1.1; the Symantec Client Security 1.0, 1.1, 2.0 (SCF 7.1); the Norton Internet Security and Professional...
  • Mac OS X riddled with security holes

    05/04/2004 5:20:32 PM PDT · by FourPeas · 77 replies · 257+ views
    TechWorld ^ | 04 May 2004 | Kieren McCarthy
    04 May 2004 Apple releases range of patches for known and unknown vulnerabilities. By Kieren McCarthy, Techworld Apple has released a range of patches for security holes - both old and new - for its Mac OS X operating system, which it advises users to download immediately. The company is downplaying the issue but one security company at least is concerned that the vulnerabilities could be extremely serious. Secunia has given the five - yes, five - patches a "highly critical" rating and warned that they may allow hijacking, security bypass, data manipulation, privilege escalation, denial of service and system...
  • Internet Technology Vulnerable to Hackers

    04/20/2004 4:14:40 PM PDT · by justlurking · 5 replies · 103+ views
    Associated Press ^ | 4/20/2004 | Ted Bridis
    WASHINGTON - Researchers uncovered a serious flaw in the underlying technology for nearly all Internet traffic, a discovery that led to an urgent and secretive international effort to prevent global disruptions of Web surfing, e-mails and instant messages. The British government announced the vulnerability in core Internet technology on Tuesday. Left unaddressed, experts said, it could allow hackers to knock computers offline and broadly disrupt vital traffic-directing devices, called routers, that coordinate the flow of data among distant groups of computers. "Exploitation of this vulnerability could have affected the glue that holds the Internet together," said Roger Cumming, director for...
  • Sony develops paper DVD

    04/19/2004 1:02:56 PM PDT · by demlosers · 22 replies · 329+ views
    Yahoo ^ | Mon Apr 19, 2004
    TOKYO (AFP) - Electronics giant Sony and another Japanese company have developed a "paper disc" that can record more than two hours of high-definition images and be destroyed with scissors for foolproof data security, officials said. The 25-gigabite Blu-ray optical disc is 51 percent paper and was developed jointly with Toppan Printing Co. Ltd. of Japan. "Since a paper disc can be cut by scissors easily, it is simple to preserve data security when disposing of the disc," Toppan managing director Hideaki Kawai said in a joint statement with Sony. Masanobu Yamamoto, senior managing director at optical disc development division...
  • State Computers Systems completely shut down in Arkansas....

    04/16/2004 3:34:01 PM PDT · by TheBattman · 40 replies · 343+ views
    4/16/2004 | Me
    I hadn’t heard anything via the news today, but the DIS (Department of Information Services) the department responsible for upkeep of the state’s computer systems (Government, Schools, etc.) instructed all schools statewide that all computers, including workstations, servers, etc. MUST be shut down at the end of the school day today (Friday 4/16/2004). This is to apply to ALL computers tied in with the state network. The reason? An unmanageable number of viruses and an attack by hackers (probably allowed in via the email worms infecting the system). The network is suppose to be completely down through 8:00 AM Monday...
  • Message To Spyware: Get Off Our Private Property

    04/10/2004 5:37:46 AM PDT · by j_tull · 29 replies · 344+ views
    Tech News World ^ | Gene J. Koprowski
    By Gene J. Koprowski TechNewsWorld March 25, 2004 "We monitor these trends for our customers, and we've been telling them that this is something they need to worry about," Bruce Hughes, director of malicious code research at TruSecure's ICSA Labs, a Herndon, Virginia-based computer security consultancy, told TechNewsWorld. "The number of complaints is increasing." Keystroke loggers and spyware developers may soon be silenced, as Congress is debating a bill that would outlaw the intrusive software and declare it akin to trespassing on private property. "It's my computer. It's my private property," said Sen. Conrad Burns (R-Montana), during a public hearing...
  • First Native Trojan Horse That Attacks Mac OS X Found

    04/09/2004 10:08:07 AM PDT · by rs79bm · 59 replies · 251+ views
    <p>Thanks to Apple Computer's rising star in the world of digital music, Mac OS X has become a target for malware authors.</p> <p>A Trojan horse, called MP3Concept or MP3Virus.gen, has been discovered that masquerades as an MP3 file. It hides in ID tags of the file and becomes activated when unwary users click on it, expecting to play a digital song.</p>
  • US-CERT Vulnerability Note VU#323070 (Internet Explorer Security Hole)

    04/08/2004 12:56:30 PM PDT · by Salo · 21 replies · 512+ views
    CERT ^ | 04/05/2004 | Art Manion
    Vulnerability Note VU#323070 Microsoft Internet Explorer does not properly validate source of CHM components referenced by ITS protocol handlers Overview Microsoft Internet Explorer (IE) does not adequately validate the source of script contained in compiled help (CHM) file components that are referenced by the Microsoft InfoTech Storage (ITS) protocol handlers. An attacker could exploit this vulnerability to execute script in different security domains. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE. I. Description The Cross Domain Security Model IE uses a cross-domain security...
  • Intego warns of Trojan Horse for OS X, offers update

    04/08/2004 12:52:52 PM PDT · by HAL9000 · 28 replies · 217+ views
    Macintosh News Network ^ | April 8, 2004
    <p>Intego today said it released an updated virus definitions for Intego VirusBarrier to protect Mac users against the first Trojan horse that affects Mac OS X. This Trojan horse, MP3Concept (MP3Virus.Gen), exploits a weakness in Mac OS X where applications can appear to be other types of files: "The Trojan horse's code is encapsulated in the ID3 tag of an MP3 (digital music) file. This code is in reality a hidden application that can run on any Macintosh computer running Mac OS X. Intego says the malicious application can delete files, propogate itself by sending a message to other users, and also infect other MP3, JPEG, GIF or QuickTime files.</p>
  • How secure is OS X?

    04/03/2004 1:24:42 PM PST · by Swordmaker · 73 replies · 81+ views
    Enterprise Security Today Enterprise Security Today ^ | 3/22/2004 | James Maguire James Maguire James Maguire
    To many Mac users, the recent news report of an Apple OS X security vulnerability seemed like an anomaly. While Windows users are greeted almost weekly with a new virus or worm, OS X users tend to view their systems as impervious to such concerns. The steady stream of Windows bugs is a phenomenon far removed from their computing experience -- or so it seems. But the late February security report cast Apple in a new light. Chris Adams, a systems administrator in San Diego, discovered a flaw in the Apple Filing Protocol (AFP), a tool in OS X 10.3,...
  • Longhorn Beta Delayed to 2005 [Windows XP successor delayed again]

    04/03/2004 6:46:06 AM PST · by Law · 100 replies · 218+ views
    VNUNet ^ | April 2, 2004 | Daniel Thomas
    Microsoft is delaying the rollout of the beta of its Longhorn operating system until early next year in order to focus on improving security in... Windows XP... The beta of Longhorn - the successor to Windows XP - was supposed to be distributed before the end of this year, but has now been moved back... The move is likely to delay the commercial rollout of Longhorn, which Microsoft said would only be released once beta trial customer feedback had been incorporated into the product... In 2001, Microsoft spoke about releasing Longhorn in late 2004, but then said it was likely...
  • Hacking danger for outsourced records hard to gauge

    03/28/2004 3:29:20 AM PST · by sarcasm · 27 replies · 123+ views
    San Francisco Chronicle ^ | March 28, 2004 | Carrie Kirby
    <p>Ankit Fadia, an 18-year-old freelance security tester, has successfully broken into more than a dozen computer networks in India. But the Stanford freshman really doesn't think that's much of an accomplishment.</p> <p>"As far as computer security is concerned, India is really bad,'' said Fadia, who published three books about computer security before leaving his native India. "Security is not a high priority for Indian companies."</p>
  • IE Flaw Exposes Weakness In Yahoo! Filtering

    03/24/2004 5:00:42 PM PST · by LaserLock · 16 replies · 107+ views
    The Register ^ | John Leyden
    Flaws in the filtering technology used by Web-based email services make it possible for hackers to smuggle viruses past defences. Israeli security outfit GreyMagic Software warned today that this "severe security" vulnerability could allow attackers to run code of their choice, "simply by sending an email to an unsuspecting Hotmail or Yahoo! user". When the victim attempts to read this email, the code executes to potentially dire consequence (e.g. theft of the user's login and password, seizure of machines etc.). The problem stems from a Cross-Site Scripting vulnerability involving IE. To blame is a new way to embed script involving...
  • Hotmail, Yahoo Users at Risk of PC Takeover

    03/23/2004 10:52:20 AM PST · by Dbdaily · 44 replies · 392+ views
    March 23, 2004 Hotmail, Yahoo Users at Risk of PC Takeover By Ryan Naraine A potentially serious security flaw found in Web-based e-mail services offered by Microsoft (Quote, Chart) and Yahoo (Quote, Chart) could put millions of PCs at risk of takeover, an Internet security research firm warned Tuesday. Israel-based security consultants GreyMagic issued the advisory with a chilling warning that attackers could inject malicious code by simply sending an e-mail to an unsuspecting Hotmail or Yahoo user. The vulnerability only affects Hotmail and Yahoo running on Microsoft's Internet Explorer (IE) browser. "When the victim attempts to read this email,...
  • New Hacking Tool Hijacks File-Sharing Networks

    03/21/2004 4:34:41 PM PST · by LaserLock · 33 replies · 215+ views
    New Scientist ^ | March 19, 2004 | Mikko Hypponen
    Computer hackers have started using peer-to-peer networks to remotely take over hoards of "zombie" computers, adding yet more malicious capability to the hackers' tool-kit. Network administrators at universities from Europe to the US recently detected the tool, a worm called Phatbot, on their machines. Phatbot is currently under analysis by the US Department of Homeland Security, in conjunction with a group of security analysts. They say that Phatbot represents a new way for hackers to send spam and launch denial of service attacks that bring down websites by flooding them with traffic. However, although the worm has infected millions of...
  • New trojan being used to launch attacks, send spam (Phatbot)

    03/18/2004 8:04:35 AM PST · by Born Conservative · 9 replies · 151+ views
    The Age ^ | 3/18/2004 | Sam Varghese
    Malicious attackers have embraced a new tool that uses the peer-to-peer concept employed by file-sharing software to create bigger networks under their command, using which they can flood people with either malware or spams. The new tool is a trojan which is being called Phatbot by security researchers. It links each computer it infects into a network and the attacker can then issue commands to the bot through any of the commandeered machines. This effectively means that unless all the infected machines are shut down, the attacker can continue to issue instructions through those which have not been taken down....
  • How the clueless few diminish Internet community

    03/06/2004 8:32:51 AM PST · by Indy Pendance · 33 replies · 104+ views
    Houston Chronicle ^ | 3-6-04 | DWIGHT SILVERMAN
    If you've been feeling under siege lately from computer viruses and worms, you're not paranoid. Yes, the authors of this malicious code really are out to get you, and with increasing frequency. Apparently, they're out to get each other, too. The makers of antivirus software have discovered taunting messages buried in the code of several worms currently plaguing the online world. It appears the authors of the Bagle, MyDoom and Netsky variants are trying to one-up each other in a virus-writing war. For example, found inside Netsky.F, a version released this week, are the words "Bagle — you are a...
  • Sun (Solaris) passwd(1) Command Vulnerability (root exploit)

    03/05/2004 7:18:31 AM PST · by general_re · 18 replies · 215+ views
    CIAC ^ | March 2, 2004 | CIAC/Sun Microsystems
    O-088: Sun passwd(1) Command Vulnerability [Sun Alert ID: 57454] March 2, 2004 22:00 GMT PROBLEM: The passwd command computes the hash of a password typed at run-time or the hash of each password in a list. A vulnerability exists in this command. PLATFORM: Solaris 8, 9 (SPARC and x86 Platforms) DAMAGE: A local unprivileged user may be able to gain unauthorized root privileges due to a security issue involving the passwd(1) command. SOLUTION: Install the security patch. VULNERABILITY ASSESSMENT: The risk is MEDIUM. A local unprivileged user may be able to gain unauthorized root privileges. LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-088.shtml ORIGINAL...
  • Apple QuickTime Player Has an Unspecified Flaw That Permits Remote Code Execution

    03/04/2004 10:38:27 PM PST · by Leroy S. Mort · 27 replies · 217+ views
    Securitytracker.com ^ | March 2, 2004
    SecurityTracker Alert ID:  1009283 CVE Reference:  GENERIC-MAP-NOMATCH   (Links to External Site) Date:  Mar 2 2004 Impact:  Execution of arbitrary code via network, User access via network Advisory:  eEye Digital Security Description:  An unspecified vulnerability was reported in Apple's QuickTime media player. A remote user can cause arbitrary code to be executed on a target user's system. eEye Digital Security issued a preliminary notice of an upcoming advisory. Apple's QuickTime media player reportedly contains a vulnerability that allows a remote user to cause arbitrary code to be executed "with little user interaction." All affected QuickTime platforms are affected, the report said. No further information was provided...