online safety - News, Features, and Slideshows
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
By Lucian Constantin | 27 March, 2015 22:46
Microsoft has blacklisted a subordinate CA certificate that was wrongfully used to issue SSL certificates for several Google websites. The action will prevent those certificates from being used in Google website spoofing attacks against Internet Explorer users.
By Lucian Constantin | 26 March, 2015 00:59
Flash files that are vulnerable to a serious flaw patched by Adobe Systems over three years ago still exist on many websites, exposing users to potential attacks.
By Lucian Constantin | 25 March, 2015 01:18
Security researchers who participated in the Pwn2Own hacking contest this week demonstrated remote code execution exploits against the top four browsers, and also hacked the widely used Adobe Reader and Flash Player plug-ins.
By Lucian Constantin | 20 March, 2015 23:08
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
By Lucian Constantin | 20 March, 2015 08:02
After a security enthusiast discovered a loophole that allowed him to register a valid SSL certificate for Microsoft's live.fi domain, he tried to responsibly disclose the issue. But instead of thanks he got locked out of his email, phone, Xbox and online storage accounts.
By Lucian Constantin | 19 March, 2015 04:52
Microsoft updated its Enhanced Mitigation Experience Toolkit (EMET), a free exploit prevention tool, to protect against attacks that attempt to bypass Internet Explorer's sandbox using VBScript.
By Lucian Constantin | 18 March, 2015 04:09
Microsoft released an update to blacklist an SSL certificate for one of its domain names that was issued to an unauthorized third party.
By Lucian Constantin | 17 March, 2015 22:07
In an effort to simplify authentication for its services, Yahoo has introduced a new mechanism that allows users to log in with temporary passwords that are sent to their mobile phones.
By Lucian Constantin | 17 March, 2015 01:24
Over a million WordPress websites that use a popular plug-in to optimize their search engine results are at risk of being hacked if they don't apply a newly released patch.
By Lucian Constantin | 13 March, 2015 00:06
A new tool allows hackers to generate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.
By Lucian Constantin | 11 March, 2015 00:38
Adobe Systems launched a new program that encourages security researchers to find and report vulnerabilities in the company's websites and other online services.
By Lucian Constantin | 06 March, 2015 01:41
Aggressive adware applications that break the trust between HTTPS (HTTP Secure) websites and users have been at the center of controversy lately. But over the past week, HTTPS interception flaws of varying severity were also found in security programs, with products from antivirus vendor Bitdefender being the latest example.
By Lucian Constantin | 27 February, 2015 05:40
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
By Lucian Constantin | 26 February, 2015 06:07
As a result of reports received through its bug bounty program Facebook confirmed and fixed 61 high-severity vulnerabilities last year, almost 50 percent more than in 2013.
By Lucian Constantin | 26 February, 2015 05:03
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FT.Net Solution ArchitectNSW
- CCMobile iOS DeveloperNSW
- CCMobile Designer / Developer - IOSNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCFront End Web Developer (Drupal)NSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CC.Net Solution ArchitectNSW
- CCDBA (Oracle/SQL)NSW
- FTSenior SQL DBANSW
- CCMobile Designer / Developer - IOSNSW
- CCSenior Systems EngineerNSW
- CCSenior Release EngineerNSW
- FTApplication Support SpecialistNSW
A guide for security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up
- Microsoft should forget the Surface, stick to the Pro 2-in-1 line
- Slack hacked, compromising users' profile data
- Congress moves quickly on cyberthreat information sharing
- New mobile-malware detection technique uses gestures
- Google Cloud Launcher deploys VM-based apps in a snap
- Apple Watch mini-stores to open in London, Paris, Tokyo luxury retail shops