Blog Posts Tagged with "Microsoft"
May 13, 2011 Added by:Headlines
In the run-up to Microsoft's Patch Tuesday, Windows users are being warned of an email spam campaign designed to infect PC's with the Zeus Trojan. Researchers indicate the malware spam operation began on Friday, May 6, and is still actively delivering the fake update alerts...
May 03, 2011 Added by:Headlines
The lawsuit alleges privacy violations for the collection of location data, deceptive business practices for failing to notify customers, and violations of the Computer Fraud and Abuse Act for harvesting the data from individual devices...
April 27, 2011 Added by:Headlines
Microsoft insists that if the Wi-Fi feature is disabled on a device that no location data is collected or transmitted, and also states that even if the feature is active, data is only collected if the user gives an application permission to access location data...
April 25, 2011 Added by:Robert Siciliano
These virtual dollars and virtual goods have real value. Virtual currency includes the points customers receive from retailers, merchants, airlines, hotels, and credit card companies through loyalty programs. These points are the second most traded currency on the planet...
April 20, 2011 Added by:Headlines
The first vulnerability affecting both browsers could have allowed access to private information. The second one that affected only Chrome exploited a weakness in how the browser accessed memory, and could have allowed an attacker to execute code within the Google Chrome Sandbox...
April 12, 2011 Added by:Headlines
"Google can’t be under the misimpression that FISMA certification for Google Apps Premier also covers Google Apps for Government. If that were the case, then why did Google, according to the attachments in the DOJ brief, decide to file a separate FISMA application?"
April 06, 2011 Added by:Headlines
“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."
April 04, 2011 Added by:David Navetta
Shortly after the FTC Privacy Framework's release and its “Do Not Track” proposal, the response was robust to say the least. Several major web browsers announced support for a browser-based means of defeating persistent online tracking...
April 01, 2011 Added by:Simon Heron
This scam involves fraudsters cold calling people claiming to be a Windows support tech and getting the victim to give them remote access to their PCs in the guise of helping them ‘cleanse’ their systems – as long as the victim hands over money or in some cases much more...
March 24, 2011 Added by:Headlines
"We believe these are politically motivated, state-driven/funded attacks. One of the origins of the attack that we experienced is from Iran. What is being obtained would enable the perpetrator to intercept Web-based email/communication," said Melih Abdulhayoglu, the CEO and founder of Comodo...
March 21, 2011 Added by:Headlines
Google has blamed the Chinese government for problems accessing Gmail. Google "noticed some highly targeted and apparently politically motivated attacks against our users. We believe activists may have been a specific target. We’ve also seen attacks against users of another popular social site..."
March 18, 2011 Added by:Headlines
Microsoft provided documentation that detailed the botnet's extensive structure in a federal court filing. Acting on the information, federal marshals raided several internet hosting providers across the U.S. and seized servers suspected of being used as command and control units...
February 25, 2011 Added by:Danny Lieberman
In the course of a security audit/penetration test of a social networking Web site this week that was developed and deployed on Ubuntu, I was reminded yet again that we all have something to learn. Even Linux geeks...
February 07, 2011 Added by:Dan Dieterle
The protests in Egypt have touched off controversy here in the US over Obama’s internet kill switch. Joe Lieberman and his co-sponsors are planning on introducing the Cyber Security and American Competitiveness Act of 2011 during the current session in congress...
February 04, 2011 Added by:Headlines
David Finn, associate general counsel at Microsoft, cites evidence that criminal organizations are finding software piracy to be lucrative. One Mexican cartel is thought to make as much as $2.2 million dollars per day distributing pirated software. That is big business...
February 01, 2011 Added by:Headlines
“The main impact of the vulnerability is unintended information disclosure. We're aware of published information and proof-of-concept code that attempts to exploit this vulnerability, but we haven't seen any indications of active exploitation..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013