Apple security update / Centrino Wi-Fi flaw / Black Hat 2006
Apple issues Mac security updateApple has released a security update for Mac OS X to fix a number of flaws in the support for Bluetooth, OpenSSH, and more. - CIO Magazine
Apple fixes 26 Mac OS X flaws
Apple has issued a security update for Mac OS X that fixes up to 26 flaws, some of which are considered serious. - CNET News.com
Hackers try to crack Windows Powershell
Microsoft's scripting language Powershell has become a new target for hackers. - CNET News.com
McAfee patches holes in SecurityCenter
Antivirus vendor McAfee has issued a security update to fix a critical vulnerability in its consumer products. - Computer Weekly
Microsoft Powershell targeted by worm
An Austrian hacker group has created a proof-of-concept worm that uses Microsoft's scripting language Powershell. - Computer Weekly
Rootkits emerge as maturing IT threat
Rootkits have gained popularity among virus writers as the stealth technology is well suited for targeted under-the-radar attacks. - Government Computer News
Security pros working hard to stay ahead of hackers
Researchers gathered at the Black Hat conference hopes to identify emerging trends and stay ahead of malicious hackers. - Government Computer News
McAfee patches critical bug in consumer software
McAfee issued a critical security update on Tuesday for its SecurityCenter software that is used in most of its consumer security products. - InformationWeek
Story lines abound on eve of Black Hat 2006
Following last year's drama at Black Hat 2005, this year's attendees look forward to a number of perhaps equally controversial presentations. - InformationWeek
Firefox is doing so well it's now a malware target
With over 200 million downloads open-source browser Firefox has become a target for exploits and malware. - Internetnews.com
Hackers and G-men to descend on Las Vegas
Both IT vendors, government experts and teenage hackers meet in Las Vegas for the annual Black Hat and Defcon conferences. - AP/MSNBC
Microsoft plays down bug panic
Speculation that Microsoft's security fix for a Windows flaw didn't work is due to confusion, since a released exploit actually takes advantage of an unpatched issue. - Network World Fusion
The future of enterprise security
Securing peripheral devices is the next big security challenge for enterprises, while smaller business are falling behind. - NewsFactor
Wireless worms threaten laptop users
Vulnerabilities in Windows drivers for Intel's Centrino platform could leave laptops open for attacks through Wi-Fi connections. - SC Magazine UK/US
Intel warns of Centrino wireless driver flaws
Intel has issued a warning about possible security flaws in drivers for its Centrino platform wireless products. - SC Magazine UK/US
KaZaa users warned of p2p worm
A proof-of-concept worm uses Microsoft's Powershell scripting language and propagates through the shared folder in p2p application KaZaa. - SC Magazine UK/US
Alert over stolen tax file numbers
A keylogging trojan has resulted in stolen tax file numbers from at least 170 Australians. - Sydney Morning Herald
Apple patches 26 security flaws
17 of the flaws patched in Apple's security update could expose users to arbitrary code execution. - Vnunet.com
Intel admits to Centrino Wi-Fi security flaw
Intel admits that there is a number of security flaws in the Windows drivers for its Centrino Wi-Fi products. - Vnunet.com
Spam dominated mail during July
Security firm Softscan reports that almost 90 percent of the email scanned by the company in July was spam. - Vnunet.com
Huge botnet swamps U.K. firms with 8M phishing emails
A botnet comprised of estimated 20.000 computers has been used to send out over 8 million phishing mails in a 24 hour period. - Vnunet.com
Hackers ramp up 'insidious' targeted attacks
Virus writers are turning to spamming links to malicious websites instead of mass-mailing worms directly to users. - Vnunet.com
Hijacking a MacBook in 60 seconds or less
At the Black Hat conference two security experts demonstrated how a wireless laptop, in this case a MacBook, can easily be hacked by attacking the wireless device drivers. - Washington Post
0 Comments:
Post a Comment
<< Home