Calendar
« September 2024 » | Su | Mo | Tu | We | Th | Fr | Sa | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |
|
Main » Entries archive
Google just made it easier for people to collaborate with each other using Microsoft Office by officially launching Google Cloud Connect Thursday.
|
The Hackus team is coming out with a new
concept for its 48 hour hacking event this year. This new formula will
be very different from last year’s. It will remain a competition and
prizes will be given out.
To increase the realism, information
related to the event(s) is limited. The 2011 edition of the Hackus will
be the biggest of its kind in Canada, something never seen in this
country before.
The contest is being held at the University of
Sherbrooke, in Quebec Canada. Participants will be challenged, and many
different skillsets will be solicited during this 48 hours span.
A
realistic pen-testing simulation, for the fictitious enterprise
"Ini-Tech inc”, has been prepared for them. Main focuses this year are:
Social- Engineering
...
Read more »
|
Firefox 4 Beta 11 features the addition of support for the proposed
"Do Not Track” (DNT) header – users can enable the DNT option via a
check box under the "Advanced” tab in Firefox’s Preferences. Once
enabled, a header will signal websites that support DNT that the user
wishes to opt-out of online behavioural tracking. However, at this
time, no web sites currently support the feature. The default
homepage, the Firefox Start Page (about:home), has also had its
design refreshed.
- "When the feature is enabled and users turn it on, web sites will
be told by Firefox that a user would like to opt out of OBA,” Mozilla
privacy lead Alex Fowler
...
Read more »
|
Actually this facility is shifted in
version 9 but we are able to do some initial steps in the version 7 and
we are able to use some of the functionality in version 7 of the Google
Chrome.
|
How to use Keyscrambler
Personal:
1. Free download
Keyscrambler Personal to protect yourself from keyloggers.
2. Install
this Keyscrambler software on your computer and restart.
3. Now,
after restart, whenever you will hit any keystroke, you can see the encrypted
corresponding keystroke in Keyscrambler overlay window. Thus, even if any
keylogger is unknowingly installed on your computer, you don't have to worry at
all. Keylogger will record all the encrypted keystrokes which are different from
your typed keystrokes.
So friends, protect yourself from keyloggers by
installing this Keyscrambler p
...
Read more »
|
On
the 27th january 2011 5 men are caught for the taking part in the
anonymous DDOs attack.The Metropolitan Police Service's Police Central
e-Crime Unit caught them.
The age of the all males are 15 16 19 20 and the 26.They are
currently in the custody of West Midlands, Northants, Herts, Surrey and
London.
Police report says this,
"Five arrested under Computer Misuse Act
Detectives from the Metropolitan Police Se
...
Read more »
|
Facebook has finally added the ability to access the site via a HTTP
Secure (HTTPS)connection, which should drastically increase security
for users.
HTTPS provides a combination of the HTTP and SSL protocols, enabling
encrypted communication between your computer and a web server. Without
it you're exposed to sniffing attacks on the network; for example, if
you're using a public Wi-Fi to Access Facebook.
...
Read more »
|
Symantec Security Products :- Attackers
can run a deadly code in the log viewer.To this attackers forcefully
supplies JavaScript file into a victim's computer.
Solution :- The latest updates of this products have patched this vulnerability.
F-Secure Antivirus :- Due to an error in the search engine,This program is no longer helpful to scan the virus lying under ZIP/RAR files.
Solution :- User have to install the manufacture's latest updates.
Mozzila Firefox :- Mozzila firefox's version 3.0.9
caused many computer crashes
...
Read more »
|
Attack Surface Analyzer tool is announced by the microsoft regarding the issues of the security changes.It detects all the changes have been done in the security by analyzing the registry entries,ActiveX controls & the added files in the windows system.
Here is the screen shot of the scan done by this tool.
The aim of the microsoft developer is very clean that any 3rd party software is installed on the system then this tool is checking that weather the installed tool increased the attack surface on the windows platform o
...
Read more »
|
As we all know that wireless applications have numbers of vulnerabilities higher then the wired applications and the devices. In India there are not lots of people who do banking through mobile but outside India there are high profile countries in which many people do banking through mobile only.So the assurance of the security is needed for them.
Here are some recommandation that the bank and the financial institutions which to be noted and to be implemented in their system.
- Implement 2 way and 2 factor authentication which goes with the traditional username and the password.If username and password are compromised, the attacker still needs the second factor to gain access to an account.
- Implement high transaction monitoring and also fraud detection system.If hacker passes the 1st factor of authentication or
...
Read more »
|
|