Monthly Archives: December 2012
This month's Patch Tuesday includes bulletins from both Microsoft and Adobe, and covers a range of platforms and products.
There are updates in the mix for everything from Android to Windows RT, and from the Word Viewer to Exchange.
A woman who tried to unlock a stolen iPhone unwittingly took her own photo. An application on the phone then automatically sent the photo to the owner, who called the police.
It's a good reminder that there are tools out there, either free or darn close to it, that can track your stolen or lost smartphone.
The Australian Defence Force Academy is the latest high-profile organisation to become embroiled in a data breach.
The breach revealed names, birthdates, and some...well, some stinkingly bad passwords. Find out more...
A contractor working for the US Secret Service left two tapes full of extremely sensitive data on a Metro train, losing the extremely sensitive, personal data of staff, contact and overseas informants.
Malware has been spammed out widely, claiming to come from the Better Business Bureau.
Be on your guard.
Chester finally brings up his century with Chet Chat Episode 100 - the Benjamin Franklin edition!
Chet's guest in the 100th Chet Chat is Paul Ducklin.
Bogus hotel reservation emails have been spammed out widely, which claim to come from Booking.com but in reality carry malware designed to infect Windows computers.
Jens Steube, author of the pasword cracking tool hashcat, can make your SHA-1 password cracking tool 25% faster.
Just like that.
If you unwittingly downloaded malware to your computer which masqueraded as anti-virus software would you just clean it up and carry on, or report it to the authorities?
Experts estimate that there are now some one million images of abused and/or exploited children available online, with the total growing by 50,000 per year.
Is this a cheap shot by Microsoft?
Or are they right to highlight the malware problem on Android smartphones?
Hidden on the net is online content which is not so easily accessed, known as the Deepnet (also sometimes called Darknet, the Deep Web or Hidden Web).
Julian Bhardwaj takes us on a tour, and asks should computer users be allowed to remain anonymous online?
You, and a billion other Facebook users, only have a few days left to take part in an important vote about how your personal data is used by Facebook.
What do you do when attackers are abusing legitimate domain Registration services?
How do you stop or at least disrupt the malicious attacks?
Reporting the incident to the appropriate Registrar is the correct course of action, but as you can read, doing so does not necessarily guarantee results.
When security researchers make available proof of concept code to demonstrate vulnerabilities, are they actually supporting the malicious exploit kit authors?
SophosLabs expert Gabor Szappanos shows that the creators of exploit kits aren't the ones discovering the zero day vulnerabilities.