Today's Tech News and Reviews
Product Reviews
Technology News

Latest Articles

Source: Sean Michael Kerner @ InternetNews Google today updated its stable version of the Chrome browser to version 1.0.154.58 to fix a serious security issue. The ‘funny’ thing is the issue is triggered by Microsoft’s Internet Explorer (IE) browser. The issue is very serious and according to Google could potentially enable something called universal cross-site scripting (UXSS) without a user having to do anything. According to Google’s bug report on the issue: When loaded in Internet Explorer, a specially crafted HTML page can launch Google Chrome with an arbitrary URI without requiring any user interaction. That’s right friends, if you…

Source: Dancho Danchev @ ZDNet Any research is prone to irrelevance if it starts with the wrong research questions, takes the wrong perspective, or in this case, attempts to fight the wrong enemy – automated bots attempting to recognize CAPTCHAs. Researchers at Google recently released a paper detailing a new CAPTCHA system consisting of correct image rotation (Socially Adjusted CAPTCHAs) whose main purpose is to make it easier for humans, and much harder for bots to recognize them. But with the emphasis of this and many other research papers on  “bots vs CAPTCHAs”, the research excludes a growing trend to…

Source: Ryan Naraine @ ZDNet Conficker worm squirming through the Windows operating system, security researchers at the Honeynet Project have scored a major breakthrough, finding a way to fingerprint the malware on infected networks. Now, with the help of Dan Kaminsky and Rich Mogull, off-the-shelf network scanning vendors have the ability remotely (and anonymously) detect Conficker infections. “You can literally ask a server if it’s infected with Conficker, and it will tell you,” Kaminsky explained.  “Usually, we get to scan for a vulnerability but, because Conficker actually changes the way that Windows looks on a network, we now get to…

Source: James (Poc Network) Poc Network representatives were on-scene this Sunday at EarthFair 2009 in San Diego (Balboa Park), showing support for a greener tomorrow. Poc representatives shared tricks and concepts to better improve the energy usage of computers (and other electronics) in the office environment. Representatives were also offering discounted services to vendors who attended the event. Any purchase of services by the vendors would also lead to a contribution to local charities.

Source: David Marcus @ McAfee Today McAfee has released The Carbon Footprint of Email Spam Report. The study looks at the global energy expended to create, store, view, and filter spam across 11 countries: Australia, Brazil, Canada, China, France, Germany, India, Mexico, Spain, the United States, and the United Kingdom. The report correlates the electricity spent on spam with its carbon footprint, because fossil fuels are by far the largest source of electricity in the world today. Since emissions cannot be isolated to one country, the study averages its findings to arrive at the global impact. Key findings include: The…

Hey Everyone! It’s your favorite Poc blogger Ryan Sanders! I wanted to briefly touch up on the difference between solo web designers and “Web Design Firms”. I have heard a lot of discussion about this in various forum communities and have had businesses bring this up many times in conversation with me or my co-workers. Solo Designers Using any test of statistics shows that a solo web designer is usually a *student* looking to obtain the experience in the design industry. In most cases they are still in the process of obtaining their degree or educational interest. In other situations…

Source: The Associated Press – Salt Lake City University of Utah officials say a computer virus has infected more than 700 campus computers, including those at the school’s three hospitals. University health sciences spokesman Chris Nelson said the outbreak of the Conficker worm, which can slow computers and steal personal information, was first detected Thursday. By Friday, the virus had infiltrated computers at the hospitals, medical school, and colleges of nursing, pharmacy and health. Nelson says patient data and medical records have not been compromised. “That’s secured in a much deeper way because of the implications,” he said. Nelson said…

Source: ThreatPost/ZDNet How to fight network worm Conficker Symptoms of network infection. 1. Network traffic volume increases if there are infected PCs in the network, because network attack starts from these PCs. 2. Anti-Virus product with enabled Intrusion Detection System informs of the attack Intrusion.Win.NETAPI.buffer-overflow.exploit Short description of the Net-Worm.Win32.Kido family. 1. It creates files autorun.inf and RECYCLED\{SID<….>}\RANDOM_NAME.vmx on removable drives (sometimes on public network shares) 2. It stores itself in the system as a DLL-file with a random name, for example, c:\windows\system32\zorizr.dll 3. It registers itself in system services with a random name, for example, knqdgsm. 4. It tries…

Source: Ryan Naraine @ ZDnet The Conficker botnet has stirred to life, using its peer-to-peer communication system to update itself and download scareware (fake anti-virus programs) to millions of infected Windows machines. The Conficker update comes a week after a heavily-hyped April 1st activation date and provides the first sign of the motivation behind this malware threat — financially motivated cybercrime. Alex Gostev at Kaspersky Lab, has analyzed the latest samples and found the scareware/fraudware association, which means that millions of Conficker-infected machines will start getting pop-ups pushing a fake $49.95 security scanner. Gostev writes: One of the files is…

Security researchers say a worm that has infected millions of computers worldwide has been reprogrammed to strengthen its defenses while also trying to attack more machines. Source: Jeremy Kirk @ CIO Security researchers say a worm that has infected millions of computers worldwide has been reprogrammed to strengthen its defenses while also trying to attack more machines. Conficker, which takes advantage of a vulnerability in Microsoft’s software, has infected at least 3 million PCs and possibly as many as 12 million, making it into a huge botnet and one of the most severe computer security problems in recent years. Botnets…

1 77 78 79 80 81