I don’t mean to sound paranoid, but…it seems potential danger lurks everywhere on the Internet and your inbox — as criminals seek to infiltrate your computer or raid your bank account. That old saying that everyone is out to get you is basically true these days. Well, not everyone, but a surprisingly large number of people truly are out to get you.
Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security; the specific interdependence of flawed authentication systems that cost him so dearly — encompassing Apple, iCloud, Amazon.com, Gmail and more — would probably still exist if Honan had not gone public. Wired has the full story for those who have not been watching it unfold on Twitter.
Steve Wozniak is right — users are going to eventually be burned if they rely solely on cloud backup
Apple co-founder Steve Wozniak this week warned of the perils of depending too much on cloud storage and the general press reacted like this was: A) news, and; B) evidence of some inherent failure in cloud architecture. In fact it is not news (Woz never claimed it was) and mainly represents something we used to call “common sense”.
Eighteen of the top 24 banks in the world have malware problems, security firm Lookingglass says on Wednesday. Even three-year old worms that have long had patches and fixes to address them continue to infect the PCs of banks, including Conficker, found (gasp) in the IT deployments of 10 of the top 24.
LinkedIn users are advised to change their passwords after it was revealed that more than 6.5 million encrypted passwords were posted to a Russian hacker website. The hackers are attempting to enlist help to crack the encryption, and 300,000 accounts are already compromised
About 13 million Facebook users in the United States either do not use or do not know about the social network’s privacy controls, sharing private information they would not have otherwise. This amounts to one out of every 10 users in the country.
I often get email from people who misunderstand or fear browser cookies. And that’s no wonder, given all the false and misleading information that’s out there. Since 1996, I’ve been working to dispel the cookie myths, and neither the technology nor my opinion of cookies has changed much since then. Read on for a closer look at the good, the bad, and the crumbly aspects of web browser cookies…
For security researchers, there’s never a dull moment; online criminals constantly find new security holes to exploit, and new ways to get at your personal data. At this year’s RSA security conference in San Francisco, I got to speak with representatives from several companies about what to expect in the coming months. Here are some of the dangerous new malware trends to watch for in 2012.
Summary: There’s a remote, pre-authentication, network-accessible code execution vulnerability in Microsoft’s implementation of the RDP protocol.
Attention Microsoft Windows administrators: Stop what you’re doing and apply the new — and very critical — MS12-020 update.
Microsoft is warning that there’s a remote, pre-authentication, network-accessible code execution vulnerability in its implementation of the RDP protocol.