Free Republic 2nd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $79,241
97%  
Woo hoo!! And we're now over 97%!! Thank you all very much!! God bless.

Keyword: computersecurity

Brevity: Headers | « Text »
  • Linux/Unix e-mail flaw leaves system wide open (Users of ELM, and Mplayer)

    08/26/2005 8:03:57 AM PDT · by N3WBI3 · 15 replies · 287+ views
    TechWorld.com ^ | 2005-08-27 | Matthew Broersma
    Linux/Unix e-mail flaw leaves system wide open By Matthew Broersma, Techworld Two serious security flaws have turned up in software widely distributed with Linux and Unix. The bugs affect Elm (Electronic Mail for Unix), a venerable e-mail client still used by many Linux and Unix sysadmins, and Mplayer, a cross-platform movie player that is one of the most popular of its kind on Linux. The Elm flaw involves a boundary error when the client reads an e-mail's "Expires" header. A specially crafted e-mail could exploit the bug to cause a buffer overflow and execute malicious code on a system, according...
  • Minnesota court takes dim view of encryption

    05/24/2005 9:56:37 PM PDT · by atomic_dog · 89 replies · 1,937+ views
    CNET ^ | May 24, 2005 | Declan McCullagh
    A Minnesota appeals court has ruled that the presence of encryption software on a computer may be viewed as evidence of criminal intent. Ari David Levie, who was convicted of photographing a nude 9-year-old girl, argued on appeal that the PGP encryption utility on his computer was irrelevant and should not have been admitted as evidence during his trial. PGP stands for Pretty Good Privacy and is sold by PGP Inc. of Palo Alto, Calif. But the Minnesota appeals court ruled 3-0 that the trial judge was correct to let that information be used when handing down a guilty verdict....
  • Intruder Struck Computers Used to Run Internet

    05/09/2005 7:20:52 PM PDT · by Perdogg · 26 replies · 1,517+ views
    NY Times ^ | May 10, 2005 | By JOHN MARKOFF
    SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach of a Cisco Systems network in which an intruder seized programming instructions for many of the computers that control the flow of the Internet. Now federal officials and computer security investigators have acknowledged that the Cisco break-in last year was only part of a more extensive operation - involving a single intruder or a small band, apparently based in Europe - in which thousands of computer systems were similarly penetrated. Investigators in the United States and Europe say they have spent almost a year pursuing the case involving...
  • Apple releases Security update for OSX.3.9... This is not for Tiger.

    05/04/2005 12:30:11 AM PDT · by Swordmaker · 9 replies · 332+ views
    Apple Computer ^ | 5/3/2005 | Apple Computer staff
    Apple has announced the release of a security update for OSX.3.9 and lower. This apparently does not impact the users of OSX.4 Tiger. I suggest all Mac OSX users who have not updated to Tiger to use the Software Update option under the Apple menu to immediately update their computer's OS. Below is Apple's descriptions of the patches in this security update: -------------------------------- About Security Update 2005-005 This document describes Security Update 2005-005, which can be downloaded and installed using Software Update, or from Apple Downloads.For the protection of our customers, Apple does not disclose, discuss, or confirm security issues...
  • Aussie Scientists Create Unbreakable Diamond Code

    05/03/2005 1:26:18 PM PDT · by marshmallow · 50 replies · 1,877+ views
    SYDNEY - Australian scientists believe they have developed an unbreakable information code to stop hackers, using a diamond, a kitchen microwave oven and an optical fibre. Researchers at Melbourne University used the microwave to "fuse" a tiny diamond, just 1/1000th of a millimetre, onto an optical fibre, which could be used to create a single photon beam of light which they say cannot be hacked. Photons are the smallest known particles of light. Until now, scientists could not produce a single-photon beam, thereby narrowing down the stream of light used to transmit information. "When it comes to cryptology, it's not...
  • 'Pharming' emerges as online threat

    05/02/2005 12:36:26 AM PDT · by JohnHuang2 · 9 replies · 611+ views
    Washington Times ^ | Monday, May 2, 2005 | By Shaun Waterman
    UNITED PRESS INTERNATIONAL The nation's largest information security institute released its quarterly review of Internet threats today, highlighting the Web's growing vulnerability to a new form of online fraud called "pharming." The review also reveals that, for the first time, some security and anti-virus software is vulnerable to hackers, creating a dangerous high-level back door into users' systems. Analysts say pharming -- the redirecting of Internet users to Web pages without their knowledge -- could be used to obtain banking or other financial-services information.
  • iPods can be tools of espionage

    04/25/2005 10:38:45 PM PDT · by ambrose · 7 replies · 569+ views
    The Australian ^ | 4.26.05 | Graeme Kemlo
    iPods can be tools of espionage Graeme Kemlo APRIL 26, 2005 STOLEN laptops and lost PDAs embarrass governments and businesses. Paris Hilton's smartphone outed her contacts. But the new corporate security risk might be a seemingly innocent iPod. With gigabyte data capacities, they are the potential weak links in small-to-medium enterprises (SME) and corporate networks that are otherwise secured at significant effort and expense. Oscar Moren, Australian managing director of Pointsec Mobile Technologies, which specialises in encryption for all the main PC and mobile platforms and storage media, says Australian companies are only starting to understand how dangerous removable media...
  • Poisoned web poses risk to security

    04/23/2005 3:16:47 PM PDT · by LibWhacker · 5 replies · 831+ views
    New Scientist ^ | 4/23/05 | Celeste Biever
    COMPUTER criminals are coming up with ever stealthier ways to make money. Rather than attack PCs or email inboxes, their latest trick is to subvert the very infrastructure of the internet, the domain name system (DNS) that routes all net traffic. In doing so, they redirect internet users to bogus websites, where visitors could have their passwords and credit details stolen, be forced to download malicious software, or be directed to links to pay-per-click adverts. This kind of attack is called DNS cache poisoning or polluting. It was first done by pranksters in the early years of the internet, but...
  • Mozilla flaws could allow attacks, data access

    04/18/2005 12:36:00 PM PDT · by infocats · 40 replies · 1,332+ views
    ZD Net News ^ | April 18, 2005 | Munir Kotadia
    Multiple vulnerabilities that could allow an attacker to install malicious code or steal personal data have been discovered in the Mozilla Suite and the Firefox open-source browser. Details of the nine flaws were published on Mozilla's security Web site over the weekend. Ian Latter, senior security consultant at Internet security specialist Pure Hacking, said most of the vulnerabilities are based on the way the applications handle JavaScript. "There are some permission issues related to running JavaScript at an escalated privilege level. They remove some of the security measures used to keep JavaScript sandboxed and allow it to potentially do malicious...
  • Linux Running Windows?

    04/18/2005 5:01:34 AM PDT · by chronic_loser · 23 replies · 731+ views
    <p>Win4Lin Pro™ is the flagship product of the Win4Lin product family. Using Win4Lin’s high performance virtual computing environment (VCE), Win4Lin Pro runs virtually any Windows 2000 or Windows XP application as intended, without the need to patch the host operating system (e.g. no need to patch the Linux kernel). This next generation product is the perfect solution for the technical workstation, home, or enterprise Linux user. Organizations wishing to migrate to Linux need wait no longer because they can now run those Windows legacy business applications that until now have prevented them from moving forward.</p>
  • Company Develops Way to Restore Cookies

    04/07/2005 8:33:32 PM PDT · by bd476 · 36 replies · 1,822+ views
    NEW YORK - The company behind those floating ads that dance across Web pages has developed a way to restore the data profiles that many privacy-conscious users try to delete from their computers. Most users don't know what they are doing when they run antispyware programs that delete the profiles, known as cookies, said Mookie Tenembaum, founder of United Virtualities Inc. By deleting cookies, he said, users thwart efforts by Web sites to prevent the same ads from appearing over and over. Tenembaum said visitors are also forced to repeatedly enter usernames and passwords, which are sometimes stored in the...
  • IM viruses finally come of age

    04/06/2005 5:15:31 AM PDT · by infocats · 3 replies · 357+ views
    ZD Net ^ | April 1, 2005 | Robert Vamosi
    Over the last four years, I've been saying that instant messaging (IM) is a security threat waiting to happen. While a few random computer viruses over the years have exploited IMs, there's been a definite uptick in IM-borne virus activity within the last few weeks. Most of these IM-borne viruses have targeted MSN Messenger, although the ever popular AOL IM is not without its own problems. Microsoft's recent announcement regarding greater IM capabilities within Microsoft Office, however, could set the stage for faster and more efficient computer virus attacks in the very near future.
  • New York Lawmakers Target Modem Hijacking in First-of-Its-Kind Bill

    04/04/2005 9:34:57 PM PDT · by Crackingham · 5 replies · 457+ views
    AP ^ | 4/5/05 | Michael Gormley
    As you're clicking away at your keyboard, you may be turning your telephone modem over to Internet thieves who make international calls and a profit at your expense. That's modem hijacking. New York lawmakers on Monday announced what apparently is a first of its kind measure in the nation to target the practice, which is estimated to run up millions of dollars in illicit phone calls for Americans whose service is stolen through dial-up connections from personal computers. "They are very creative in doing what they do," said Sen. James Wright, of northern New York's Jefferson County. He said the...
  • Symantec (Norton) details flaws in its antivirus software

    03/30/2005 9:50:57 AM PST · by holymoly · 36 replies · 1,623+ views
    Symantec has reported glitches in its antivirus software that could allow hackers to launch denial-of-service attacks on computers running the applications. In a notice posted on its Web site this week, Symantec detailed two similar vulnerabilities found in its Norton AntiVirus software, which is sold on its own or bundled in Norton Internet Security and Norton System Works. The flaws, which could lead to computers crashing or slowing severely if attacked, are limited to versions of the software released for 2004 and 2005. The Information-Technology Promotion Agency of Japan, a government-affiliated tech watchdog group, identified the first instance of the...
  • DVForge Virus Prize offered, rescinded

    03/26/2005 3:53:30 PM PST · by Swordmaker · 22 replies · 463+ views
    Yahoo! News ^ | Sat Mar 26, 3:44 PM ET | By Peter Cohen - MacCentral
    DVForge Virus Prize offered, rescinded Mac and iPod peripheral maker DVForge Inc. recently sponsored a US$25,000 prize to be awarded to the first hacker who could infect two Macintosh (news - web sites) computers owned by the company. Less than a day later the company announced the cancellation of the contest, citing legal concerns. The impetus for creating the contest was a recent report from antivirus software maker Symantec Corp. "It is now clear that the Mac OS is increasingly becoming a target for the malicious activity that is more commonly associated with Microsoft and various Unix (news - web...
  • Macintosh Hacker Attacks Are on the Rise - Symantec

    03/23/2005 8:18:41 PM PST · by zarf · 69 replies · 1,245+ views
    Washington Compost ^ | 3/22/2005 | Al-Reuters
    SAN FRANCISCO -- Hacker attacks on Apple Computer Inc.'s Macintosh OS X operating system, thought by many who use the Mac to be virtually immune to attack, are on the rise, according to a report from anti-virus software vendor Symantec Corp.
  • 'Computer Cop' casting a wide, embarrassing net

    03/22/2005 10:28:48 AM PST · by Lorianne · 31 replies · 1,257+ views
    Southfield Eccentric ^ | 20 March 2005 | Pat Murphy
    A computer program designed to help parents protect youngsters from predators has received wide acceptance in Southfield, according to police Chief Joseph E. Thomas Jr. It also has an unintended - and surprising - consequence, Thomas advised the council at its March 7 meeting, when he outlined some of his department's successes. Some wives are surprised to learn their husbands may have been viewing pornography on the Internet, Thomas said. The program, called "Computer Cop," was introduced last fall as police officials became increasingly concerned about youngsters talking to strangers in Internet chat rooms. "Many of these youngsters who disappear...
  • Internet Security Takes a Hit (Chinese hackers may have cracked encryption)

    03/16/2005 5:29:28 PM PST · by Golden Eagle · 38 replies · 1,458+ views
    WSJ via CNN ^ | March 15, 2005 | CNN/Money
    Internet security takes a hit Report says computer-code experts concerned after flaw discovered in popular encryption technique. NEW YORK (CNN/Money) - The discovery of a crack in a commonly used Internet encryption technique raised concerns among government agencies and computer-code experts, according to a report by The Wall Street Journal. "Our heads have been spun around," Jon Callas, chief technology officer at encryption supplier PGP Corp., told the newspaper. The technique, called a "hash function," has been commonly used by Web site operators to scramble online transmissions containing credit-card information, Social Security numbers and other personal information. Hash functions were...
  • VoIP (Computer Phone) Warning

    03/16/2005 7:11:08 AM PST · by holymoly · 21 replies · 1,336+ views
    Computer Security News ^ | Mar 15, 2005 | Dee Scrip
    Never before in the history of telecommunications has a more important warning been needed for current and potential VoIP (computer phone) users who have joined, or will be joining, in the inevitable paradigm shift from telephone to VoIP. Warning! Warning! Warning! Beware of VoIP internet service providers that operate on industry standard codec and industry standard protocols because they are PUBLICLY OPEN and INTERPRETABLE! This also includes, but is not limited to, peer-to-peer (P2P) networks. In plain terms, this means, if you subscribe to, or considering subscribing to a VoIP internet solution provider who operates on these industry standards –...
  • FTC Says Anti-Spyware Vendor Shut Down

    03/12/2005 5:48:37 AM PST · by pickemuphere · 56 replies · 1,805+ views
    Reuters ^ | Mar 11 2005 | Reuters
    WASHINGTON (Reuters) - A software vendor that tried to drum up sales by offering to clean up nonexistent computer "spyware" has been temporarily shut down, U.S. regulators said on Friday. The makers of Spyware Assassin tried to scare consumers into buying software through pop-up ads and e-mail that warned their computers had been infected with malicious monitoring software, the Federal Trade Commission said. Free spyware scans offered by Spokane, Washington-based MaxTheater Inc. turned up evidence of spyware even on machines that were entirely clean, and its $29.95 Spyware Assassin program did not actually remove spyware, the FTC said. A U.S....