Free Republic 2nd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $80,380
99%  
Woo hoo!! And we're now over 99%!! Thank you all very much!! God bless.

Keyword: computersecurity

Brevity: Headers | « Text »
  • Java stir puts Sun in a spot

    12/09/2004 1:34:07 PM PST · by UseYourHead · 29 replies · 883+ views
    Tech News on ZDNet ^ | December 7, 2004 | Dawn Kawamoto
    A flaw in Sun Microsystems' Java software has highlighted the difficulty the company faces as flocks of tech novices start to turn to it for support. Sun disclosed a serious security flaw in its Java virtual machine (JVM) software last month. The rare problem, which affects Sun's plug-in for running Java on a variety of Web browsers and operating systems, could allow a virus to spread through PCs running both Microsoft Windows and Linux. A flaw-free version of the JVM software is available on Sun's Web site, and the company is encouraging people to swap it out. But some users...
  • Trojan program poses as anti-spam screensaver

    12/09/2004 6:01:31 AM PST · by bedolido · 3 replies · 486+ views
    NewScientist.com news service ^ | 12/4/2004 | Will Knight
    A program that spies on keystrokes and mouse clicks to capture passwords and other personal information from computer users has begun circulating disguised as a screensaver purporting to attack spam-related websites. This “Trojan horse” program is the latest twist in a controversial saga that began with the release of an anti-spam screensaver by Lycos Europe on 30 November. The www.makelovenotspam.com screensaver aimed to clog up the bandwidth of spam sites by barraging them with fake data. Experts believe the new trojan program may have been developed in retaliation to the Lycos screensaver, perhaps to deter users from downloading the it...
  • Most Browsers Buggy, Even IE In XP SP2 (A new - Test your browser here)

    12/08/2004 8:34:03 PM PST · by Eagle9 · 101 replies · 2,773+ views
    TechWeb ^ | December 8, 2004 | TechWeb News
    A European security vendor warned Wednesday that most browsers sport a bug that hackers can exploit to spoof a Web site and trick users into trusting bogus pop-up windows. The vulnerability, which Danish security firm Secunia rated as "moderately critical" is similar to previous bugs in browsers that was disclosed in July and September of 2004. Attackers could use it to add content into a trusted Web site's window by, for instance, inserting a fake form in a pop-up window seemingly opened by that site. Affected browsers, said Secunia, include the popular Internet Explorer and the up-and-coming Firefox, as well...
  • Microsoft releases Internet Explorer fix

    12/01/2004 2:32:40 PM PST · by holymoly · 45 replies · 2,240+ views
    CNet ^ | December 1, 2004 | Robert Lemos
    Microsoft published a patch for Internet Explorer on Wednesday, aiming to close a month-old hole that has been used by viruses to spread and by an ad banner attack to compromise PCs.The vulnerability, dubbed the Internet Explorer Elements flaw by Microsoft, had previously been called the iFrame vulnerability. The issue--which does not affect Microsoft's major Windows XP security update, Service Pack 2--could allow an attacker to take control of a victim's PC, if the user is logged on as an administrator. Most home users tend to log onto Windows as administrators. A Microsoft representative said the software giant had released...
  • Unprotected PCs Fall To Hacker Bots In Just Four Minutes

    11/30/2004 1:29:41 PM PST · by zeugma · 139 replies · 10,542+ views
    Techweb ^ | 11/30/2004 | Gregg Keizer
    Unprotected PCs Fall To Hacker Bots In Just Four Minutes By Gregg Keizer, TechWeb.com The lifespan of a poorly protected PC connected to the Internet is a mere four minutes, research released Tuesday claimed. After that, it's owned by a hacker. In the two-week test, marketing-communications firm AvanteGarde deployed half a dozen systems in "honeypot" style, using default security settings. It then analyzed the machines' performance by tallying the attacks, counting the number of compromises, and timing how long it took an attack to successfully hijack a computer once it was connected to the Internet. The six machines were equipped...
  • Breaking, Entering Your PC (Windows Scumware And Parasiteware Alert)

    11/26/2004 11:49:59 AM PST · by goldstategop · 94 replies · 4,647+ views
    Los Angeles Times ^ | 11/26/04 | Terry McDermott
    The site has multiple forums for various computing problems, but the overwhelming number of inquiries in the last year has dealt with spyware, which on the site has a variety of less neutral names, "scumware" being one of the more polite. Scumware had been an epidemic; in the last year it grew into a pandemic, said Steve Wechsler, one of those drawn to Eshelman's site. Wechsler was tending bar at a public golf course in South San Francisco when he bought his first computer less than a decade ago. "I brought it home and turned it on, clicked on Netscape...
  • Government Uses Color Laser Printer Technology to Track Documents

    11/22/2004 1:01:29 PM PST · by dware · 36 replies · 2,679+ views
    Yahoo! News ^ | 11/22/04 | Jason Tuohey
    WASHINGTON--Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printer there that could be used to trace the document back to you. According to experts, several printer companies quietly encode the serial number and the manufacturing code of their color laser printers and color copiers on every document those machines produce. Governments, including the United States, already use the hidden markings to track counterfeiters. Peter Crean, a senior research fellow at Xerox,...
  • OSX Safest OS

    11/02/2004 10:26:58 AM PST · by Salo · 63 replies · 415+ views
    mi2g ^ | 11/02/04 | Unknown
    Deep study: The world's safest computing environment news alert London, UK - 2 November 2004, 02:30 GMT - The most comprehensive study ever undertaken by the mi2g Intelligence Unit over 12 months reveals that the world's safest and most secure 24/7 online computing environment - operating system plus applications - is proving to be the Open Source platform of BSD (Berkley Software Distribution) and the Mac OS X based on Darwin. This is good news for Apple Computers(AAPL) whose shares have outperformed the benchmark NASDAQ, S&P and Dow indices as well as Microsoft (MSFT) by over 100% in the last...
  • A spyware mystery: Who's behind it?

    11/02/2004 9:14:57 AM PST · by 4kevin · 43 replies · 449+ views
    CNN/AP ^ | 11.02.04
    In less than two years, CoolWebSearch has become the bane of the computing industry. Its programmers have managed to reset Web browsers so that searches get rerouted to the CoolWeb search engine. And any time anti-spyware engineers find a way to stop the hijacking, a new variant pops up, sneakier than its predecessor. There are now dozens. "It's a cat-and-mouse game almost," said Tim Bryan, an InterMute Inc. software developer in charge of fighting CoolWebSearch. There are less pernicious forms of spyware, of course. And there is what's more properly termed adware because many such programs don't actually harvest data...
  • Companies Scramble to Deal With Spyware

    11/02/2004 4:03:30 AM PST · by anniegetyourgun · 79 replies · 343+ views
    AP ^ | 11/2/04 | ALLISON LINN
    SEATTLE (AP) - The people who call Dell Inc.'s customer service line often have no idea why their computers are running so slow. The ones who call America Online Inc. can't necessarily explain why Internet connections keep dropping. And those who file error reports with Microsoft Corp. don't always know why their computers inexplicably crash. Sometimes, the company that gets the complaint is rightly to blame. But with alarming frequency, officials at these and other technology companies say they are tracing customer problems back to one culprit: spyware. In the past year, spyware problems have become especially pernicious, leaving companies...
  • Anti-Spyware Programs Clean but Don't Disinfect

    10/31/2004 9:11:53 PM PST · by quidnunc · 120 replies · 6,226+ views
    The Houston Chronicle ^ | October 31, 2004 | Matthew Fordahl [Associated Press]
    Salinas, Calif. — Though less than a year old, the PC took more than åfive minutes to start up and never shut down without stalling on error messages. Attempts to Web surf generated at least a half-dozen pop-up ads and — frequently — system freezes. Internet Explorer's home page was hijacked. Attempts to reach some sites, including eBay — were redirected to random search engines that only called up more ads. Google search results were altered. And the modem, without permission, tried to dial distant lands in search of porn. Welcome to the nasty world of a PC infected with...
  • Gmail accounts 'wide open to exploit' - report

    10/29/2004 1:36:35 PM PDT · by Stoat · 2 replies · 825+ views
    The Register (U.K.) ^ | October 29, 2004 | John Leyden
    Gmail accounts 'wide open to exploit' - report By John Leyden Published Friday 29th October 2004 16:50 GMT Google's high profile webmail service, Gmail, is vulnerable to a security exploit that might allow hackers full access to a user's email account simply by knowing the user name, according to reports.The security flaw allows full access to users' accounts, with no need of a password, Israeli news site Nana says . Using a hex-encoded XSS link, the victim's cookie file can be stolen by a hacker, who can later use it to identify himself to Gmail as the original owner of...
  • New Trojan Kills Adware

    10/07/2004 7:09:26 PM PDT · by Tunehead54 · 28 replies · 1,346+ views
    PcWorld.Com ^ | Thursday, October 07, 2004 | Paul Roberts, IDG News Service
    New Trojan Kills Adware Program isn't entirely benevolent: it also downloads files to infected PCs. Paul Roberts, IDG News Service Thursday, October 07, 2004 A new Trojan horse program that attacks and removes troublesome advertising software, known as "adware," is circulating on the Internet, according to antivirus company Symantec. The program, called Downloader.Lunii, was discovered earlier this week. When run, it attempts to kill off computer processes and delete files used by common adware programs like Powerscan and BargainBuddy. However, Lunii is not entirely benevolent. Like other Trojan horse programs, it also modifies the configuration of Microsoft Windows machines and...
  • House OKs Bill Imposing 'Spyware' Fines

    10/06/2004 9:01:01 PM PDT · by InvisibleChurch · 10 replies · 665+ views
    news.yahoo.com ^ | Wed Oct 6, 2:02 PM ET | TED BRIDIS
    WASHINGTON - Companies and others that secretly install "spyware" programs on people's computers to quietly monitor their Internet activities would face hefty federal fines under a bill the House passed Tuesday. The most egregious behaviors ascribed to the category of such software — secretly recording a person's computer keystrokes or mouse clicks — are already illegal under U.S. wiretap and consumer protection laws. The House proposal, known as the "Spy Act," adds civil penalties over what has emerged as an extraordinary frustration for Internet users, whose infected computers often turn sluggish and perform unexpectedly. The bill, sponsored by Rep. Mary...
  • Zombie armies behind cyberscrime sprees

    10/04/2004 2:45:42 PM PDT · by swilhelm73 · 6 replies · 343+ views
    ZDnet ^ | October 1, 2004 | N/A
    According to communications firm Energis, online crime appears to be occurring in cyclical patterns related to the creation of botnets--zombie armies of PCs that have been taken control of without the owners' knowledge. "When you see the creation of zombie networks, you can almost see the life cycle of a spam and virus attack," said Malcom Seagrave, head of security strategy for Energis. "It's the same with DDoS [denial-of-service] attacks and those who steal data." "It's almost predictable. We can't prove it, but we think they are related. They are well-organized and they are beating the security industry." Seagrave said...
  • Poison porn pics show up online

    10/01/2004 2:38:34 PM PDT · by swilhelm73 · 50 replies · 3,283+ views
    BBC ^ | 30 September, 2004 | N/A
    Security experts have been expecting such images to turn up after Microsoft revealed a weakness in the way Windows handles the popular Jpeg format. Soon after this discovery, a program started circulating online that was written to exploit this bug. The poisoned images were posted to a porn newsgroup at the weekend and were found by Usenet provider Easynews. Early warning Poisoned pictures containing the bug have been widely predicted following the discovery of the Jpeg bug that afflicts more than a dozen Microsoft programs. To fall victim to the poisoned pictures, users must view it using Windows Explorer. VULNERABLE...
  • DEFCON 12 will be held in Vegas, July 30- August 1 2004 at the Alexis Park Hotel.

    07/27/2004 11:59:28 PM PDT · by Nonesuch · 1 replies · 274+ views
    defcon.org ^ | Friday, July 23, 2004 | Nonesuch
    DEFCON is the self-described "largest underground hacking event in the world". Official events include numerous speakers, panels, hacking and trivia contests, and the DC Shoot (geeks with guns in the desert sun). Unofficial events include parties, all-you-can-eat sushi, and a visit to the Gun & Knife show at Cashman Center. Some people think it's worth the $80 price of admission just to see the circus, to observe the hacker hangers-on baking in their de-facto uniform of black T-shirts and jeans.
  • New "critical" security patch from Microsoft tomorrow, some customers get advance notice

    07/25/2004 4:36:02 PM PDT · by Nonesuch · 6 replies · 306+ views
    Microsoft ^ | July 22, 2004 | Microsoft
    Microsoft notifies certain customers of upcoming security patches as much as five days in advance. Microsoft will release a new "critical" security patch for the Microsoft Windows operating system on Monday, JUly 26th, 2004. Microsoft provides advance notice to certain customers of upcoming patch releases. For example, late last week Microsoft sent the following email to Fortune-500 customers: On MONDAY 26 JULY 2004 the Microsoft Security Response Center is planning to release: - One Microsoft Security Bulletin affecting Microsoft Windows. The greatest maximum severity rating for this security update is Critical. This security update will require a restart. Although we...
  • First Windows CE virus emerges

    07/19/2004 1:11:58 PM PDT · by Paleo Conservative · 8 replies · 493+ views
    InfoWorld.com ^ | July 19, 2004 | By David Legard
    First Windows CE virus emerges Virus known as 'Dust' demonstrates holes in Win CE running on ARM processors By David Legard, IDG News Service A virus designed to demonstrate security holes in Microsoft Corp.'s Windows CE operating system but not to cause damage was identified by security companies over the weekend. The WinCE4.Duts.A virus (sometimes known as Dust) only affects devices running ARM Ltd. processors and infects Pocket PC PE files in the root directory, according to Bucharest-based Softwin S.R.L., which first reported the virus on Saturday. It raises a dialog box which asks "Dear User, am I allowed to...
  • Mac OS X security myth exposed

    06/25/2004 2:13:36 AM PDT · by Swordmaker · 20 replies · 450+ views
    Techworld UK ^ | 6/24/2004 | By Matthew Broersma, Techworld
    Windows is more secure than you think, and Mac OS X is worse than you ever imagined. That is according to statistics published for the first time this week by Danish security firm Secunia. The stats, based on a database of security advisories for more than 3,500 products during 2003 and 2004 sheds light on the real security of enterprise applications and operating systems, according to the firm. Each product is broken down into pie charts demonstrating how many, what type and how significant security holes have been in each. One thing the hard figures have shown is that OS...