information security

  1. JMH

    Windows 7 Why Hackers Write Computer Viruses

    Maximum PC | Why Hackers Write Computer Viruses
  2. JMH

    Windows 7 Understanding Encryption – What is Encryption?

    What is the Definition of Encryption? How Does Encryption Work?
  3. JMH

    Windows 7 Toshiba website hacked - email addresses and passwords exposed

    Toshiba website hacked – email addresses and passwords exposed | Naked Security
  4. Mike

    VIDEO The Myth of the Ethical Hacker

    "From the rise of retro fashion trends, art, music, and literature (as inspired by some great 21st century works of literature like "Pride and Prejudice and Zombies" and the complete stereo remastered works of The Beatles), I explore the notion of a Hacking Renaissance taking place today and...
  5. reghakr

    Hotmail and Yahoo users also victims of targeted attacks

    IDG News Service - Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro. Trend Micro described two similar attacks against Yahoo Mail and Windows Live Hotmail...
  6. reghakr

    Session Hijacking

    In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web site, the user's PC is tagged with a session...
  7. News

    Windows 7 Web Security: Cashier-as-a-Service(Caas) and How to Shop for Free Online

    Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the Internet. In this paper, we study the...
  8. cybercore

    Can data stored on an SSD be secured?

    Study finds the task to be very difficult; overwriting or crypto-erasure seem the best methods for sanitizing SSDs Until a university study emerged last week, few experts suspected that it's more difficult to erase data stored on solid-state drives (SSD) than that on hard disk drives (HDDs)...
  9. whoosh

    VIDEO Brad Templeton - The Future of Computer Security

  10. News

    Windows 7, Macs and HTML5 at risk in 2011

    Phil Muncaster, V3.co.uk , Tuesday 14 December 2010 at 12:08:00 Panda Security announces its predictions for the coming year Threats targeting Windows 7, Mac and HTML5 are likely to keep information security professionals busy in 2011, with hactivism and state-sponsored attacks also set to...
  11. Captain Jack

    Windows 7 Hackers Access McDonald's Customer Data

    An unknown number of Link Removed after authorities discovered that hackers broke into one of the company's business partner's databases and stole information. Computerworld quotes a McDonald's spokeswoman as saying: We have been informed by one of our long-time business partners, Arc...
  12. reghakr

    For the last 2 of you unaware: Bank Of America sucks

    Link Removed due to 404 ErrorOK, fine, "hostage" may be a bit of hyperbole. However, right at this moment, Bank of America is presenting me with a take-it-or-leave-it proposition: Agree to our "Electronic Communications Disclosure" - all 2,127 words; three densely packed printed pages - or...
  13. Mike

    VIDEO Windows Files: Search, Indexing and Online Backup

    Windows Files: Search, Indexing and Online Backup Windows Libraries and the Windows Search Index In this video, I will discuss with you: The power of the Library feature in Windows 7. The configuration of Indexing Options. And the ability to backup your files at any time, on the the Amazon...
  14. News

    Microsoft Security Advisory (2269637): Insecure Library Loading Could Allow Remote Code Execution -

    Revision Note: V1.0 (August 23, 2010) Advisory published. Advisory Summary:Microsoft is aware that research has been published detailing a remote attack vector for a class of vulnerabilities that affects how applications load external libraries. Link Removed due to 404 Error
  15. reghakr

    Spies, Lies and Damned Help Desks

    By now everyone has heard about the alleged secret agents arrested in the USA. If you haven't had a chance to read the criminal complaint against them, you're missing out on some interesting revelations. Revelation 1: Mission Completely Possible Unlike James Bond (or, heck. Austin Powers)...
  16. whoosh

    VIDEO 7 Things Every CEO Should Know About Information Security

  17. whoosh

    Windows 7 Intel Website Compromised through SQL InjectionCredit card data possibly at risk

    Link Removed - Invalid URL A hacker has discovered an SQL injection flaw in a website owned by Intel. According to the attacker, the vulnerability can be exploited to access sensitive information, including credit card details, stored in the underlying database. The proof of concept attack...
  18. reghakr

    Microsoft admits it can’t stop Office file format hacks

    Microsoft’s plan to “sandboxâ€Â￾ Office documents in the next version of its application suite is an admission that the company cannot keep hackers from exploiting file format bugs, a security analyst said on July 23. “What’s been happening is that Office has lots of...
Back
Top