Parabon preps for cyber assault

Parabon Computation has introduced a new testing service designed to help secure government and corporate networks against cyber attacks. The company plans its first public demonstration of Blitz in Anaheim this week at the Department of Defense (DoD) Defense Information Systems Agency (DISA) Customer Partnership Conference, where it will conduct live fire denial-of-service exercises.

Microsoft is hoist by its Windows petard

Opinion - It’s something of a daft idea for Microsoft to attempt to square the Windows 7 circle by creating a “starter” version which will only run three applications on a netbook PC. Windows 7 is expected to launch this autumn. It's almost certainly a better Vista than Vista.

Verizon Business Study finds organized crime is to blame for security breaches

Verizon Business has released a report which claims that organized crime is actually responsible for the majority of increasing corporate electronic records breaches. There were 285 million security breaches last year, which was more than the total number of record breaches that had occurred in the past four years combined.

Microsoft patches 23 security flaws

On Tuesday, Microsoft issued eight security updates which are promised to fix 23 security vulnerabilities, six of which were targeted by exploit code, in its Windows Operating Systems and other Microsoft Software.

First Hacker takes credit for Amazon “glitch,” Amazon apologizes

Late yesterday a hacker, identifying himself as “Weev”, is now claiming responsibility for the “glitch” on, which caused a multitude of gay and lesbian themed books to lose their sales ranks over the Easter holiday weekend. Weev posted his “confession” on a LiveJournal discussion board on Monday morning.

Twitter hit by cross-site scripting attacks

The Twitter micro-blogging network has been hit by two cross-site scripting (XSS) attacks that spread messages from user accounts across the system without users' consent. The initial “StalkDaily” messages that appeared over the weekend are now followed by a “Mikeyy” attack that apparently can infect Twitter accounts simply by viewing another infected Twitter page.

UPDATED: Conficker.e surfaces and reveals purpose: Wants $49.95

Late Wednesday, TrendMicro observed a new version of the Downad.KK/Conficker.c worm, dubbed Conficker.e. The previous version utilized its built-in P2P functionality to download the update, which then springs to life with fake or rogue antivirus messages warning of non-existent threats, along with annoying pop-ups until you agree to pay it $49.95. Conficker's authors finally unveil their true intent: Greed.

Conficker worm activated, TrendMicro says

The third Conficker/Downadup worm, which hit computers on April 1, was almost a disappointment given the excitement that had built up in the weeks before. Those expectations were followed by a lot of nothing, but it now seems that the malware has been quietly activated and downloaded what the security firm described as yet another variant of the worm now called WORM_DOWNAD.E.

Microsoft: Spam level now at 97%

It seems that Bill Gates’ 2004 prediction that there would be no spam anymore within a couple of years was wrong. According to Microsoft’s latest Security Intelligence Report, the number of spam messages has reached a dramatic level of 97% of all emails sent. However, the report covered a variety of security concerns and had some good news as well. Discovered vulnerabilities in software, for example, is down from its 2007 highs.

UPDATED: U.S. electrical grid falls victim to cyber-spying

It's being reported that the U.S. electrical grid has been infiltrated by hackers primarily from China, Russia, but also from other countries. The software does not do anything harmful, however it is giving remote entities knowledge of how our electrical grid operates, allowing them to "navigate the U.S. electrical system and its controls", according to the Wall Street Journal. It is cyber-spying, and it has targeted a critical U.S. asset -- our electrical grid.

How to turn your iPhone into unbreakable security token

VeriSign has teamed up with Apple to provide a second-factor authentication (2FA) token generator application for the iPhone. For those interested in maximizing their online security against fraud and theft, using a second-factor code, one which changes every 30 seconds, could be the best way to go. And now with VeriSign's iPhone app, you won't need to carry around a separate token or card. The iPhone becomes a one-stop shop for online 2FA security. In this article we explain the technology, and show you how to use it. EXTRAS: SLIDESHOW, VIDEO

Conficker #3: It’s Y2K all over again, perhaps

The third variant of the Conficker worm was set to strike today, but to a general surprise, humanity still exists. Will Conficker-C, despite the dramatic warnings, be as harmless as the Y2K switch more than nine years ago?

Apple, this isn't the Mac netbook we've been waiting for!

If images like these are to be believed, this is the Mac netbook Apple said would never see the light of day. Simply named MacBook mini, it looks representative and thin enough to attract attention. The $899 computer is allegedly aimed at competing with the higher-end netbook market, hence 10.4-inch LED-backlit display and integrated Nvidia 9400M GPU that also powers its bigger MacBook counterpart. Add in a 1.83GHz Intel Atom CPU, SSD and 2GB of RAM all packed in a unibody enclosure just 4 millimeters tall on its thinnest part and you probably get Apple's next big hit. The only problem is, this isn't the Mac netbook we've been waiting for. EXTRA: SLIDESHOW

Conficker worm believed to have originated from China

The Conficker worm has been widely discussed in recent weeks, and the $250,000 bounty has had many on the hunt for the virus's origination. Microsoft offered the $250,000 for anyone who could provide information which leads to an arrest in the Conficker case. 

Are Macs too expensive?

Opinion – I am sure you have seen one of those omnipresent new Microsoft commercials that aim to portray Mac products, in this specific case notebooks, as too expensive. There’s quite some buzz over the question whether Macs are really too expensive. At least for some, Microsoft’s new campaign might be a bit shallow, let alone leave the impression that Windows PCs are simply “cheap”. And even if we live in a recession, the description of being “cheap” might not work.

First email virus turns 10

It appears we have been living with viruses all the time, but if we are looking back in history we find that certain types of viruses are actually not that old. For example, the email-aware virus is turning just 10 today. Melissa, the first virus of this kind, was estimated to have infected more than one million PCs and caused damage in excess of $80 million.

Conficker Worm #3: Prepare for April 1

The third variant of the Conficker is expected to be spreading beginning on April 1. According to security software companies, the worm will send hundreds or thousands of update requests to its 50,000 domains. The result will be forced downloads of malicious code and potentially an increased rise in spam mail. It may be a good idea getting your security software up to date now.

Firefox attack code posted by security researcher

A security researcher has posted malicious code that exploits a vulnerability in Firefox 3.0.x. Mozilla reacted quickly and changed its browser release schedule: Version 3.0.8, which will include a patch, is scheduled for a release early next week.

Australian government agency blacklists a dentist office website?

It was reported last Friday that over the past several weeks, has been publishing what it claims to be a blacklist of banned websites ready to be targeted by the Australian Communications and Media Authority (ACMA). While the Australian government denies the list is actually theirs, a dentist office which appears on the list confirmed it was contacted by ACMA. Wikileaks claims to be a whistleblower organization.

Facebook privacy now a user-controlled option

Following a controversial site redesign which changed the user home page and brought users a more frequent Twitter-like update ability, content sharing, and better capabilities for group pages, the site has now begun allowing users to open up all or part of their profiles for all the world to see.