When PayPal's information security chief recently outlined new measures
the company will take to battle phishing attacks and online frauds, it
became evident that Apple's Safari browser lacks certain basic security
features. Some predicted PayPal will block Safari users from accessing
the online payment service altogether. A company spokesperson now
reassured users that this wasn't the case. However, there are no
security features in Safari to protect users from online scams and
RFID tags have long been touted as the successor to bar codes for
tracking products, but did you know that they can help track people as
well? At the Thailand RFID Forum in Bangkok, several companies told us
that RFID, when combined with Wi-Fi, can track hospital patients,
doctors and even lost children at theme parks.
Late Wednesday, Mozilla issued an update for its Firefox browser that
The bug can result in unexpected crashes, memory leaks and represents a
“critical” security risk for users.
Apple has released a new security patch for its Safari browser, to fix the infamous bug that a hacker was able to exploit in a matter of minutes. Cyber security researcher Charlie Miller was one of three participants in the "Pwn 2 Own" contest at the CanSecWest conference, and beat out his Windows and Linux competitors by breaking into a Mac the same day the contest began.
Getting someone’s computer passwords could be as
simple as dangling a tasty chocolate bar in front of their faces.
Infosecurity Europe reps, posing as market researchers, asked several
hundred office workers for their passwords, date of birth and other
sensitive information at a busy London train station. Astonishingly,
45% of the women gave their passwords while only 10% of men did the
It was just a matter of time: Researchers from the ETH Zurich breached
the iPhone’s/iPod’s Wi-Fi positioning system and found that the
technology is vulnerable to location spoofing. If you get a kick out of
upsetting iPhone users, you may be able to trick the device into
displaying a false location with very little effort.
The Federal Bureau of Investigation has reported that in 2007, Internet crimes were higher than ever before, with the cost of such crimes reaching nearly a quarter of a billion dollars. The governmental body said that over 206,000 official complaints were filed, but added that many more cyber offenses were undoubtedly committed with no consequence.
Apple has released an update for its Quicktime media player, patching 11 vulnerabilities, some of which could allow a hacker to gain remote access of someone's computer. Apple gave credit to security company Tipping Point. In addition to fixing remote code execution vulnerabilities, the update also patches some file compatibility issues and problems with third-party interactions.
The man who hacked a notebook computer during the ConSecWest conference in Washington listed the item for sale on Ebay, saying the exploit of the operating system "is most likely still present." However, after being up for just a few hours, the listing "has been removed or is no longer available," according to the former item page that now shows a listing error.
Over the weekend, a hacker managed to exploit a vulnerability in the Windows Vista Flash player, as part of the CanSecWest's "Pwn2Own" contest. The competition pitted a Windows, Apple and Linux computer side-by-side to see which would crack first. The Apple notebook, a Macbook Air, was the first to fall in just two hours after the contest started.
During a contest in Vancouver where competitors tried to hack Windows, Linux and Apple computers, the Macbook Air was the first to be compromised, taking the winner just two minutes to break into Apple's new thin notebook. Security researcher Charlie Miller pointed a browser to a website with malicious code, and the computer did not even put up a fight. The Macbook Air was installed with nothing more than the programs that come out-of-box.
iPhone owners and software developers aren’t the only ones complaining
about the access restrictions to their iPhone, it is also pretty much
the only cellphone that is giving government agencies and criminal
investigators a tough time accessing data that is or was stored in the
phone’s memory. Now there is the first application that actually
squeezes through the iPhone OS to acquire some (read: not all) data
that, for example, can be used as evidence in court.
Microsoft has issued an advisory for a critical vulnerability in Microsoft Word that, while "very limited" in scope, could lead to damaging attacks without an official fix yet. The software giant confirmed the vulnerability that was reported earlier this month from Ismael Briones, a researcher at antivirus company Panda. According to the reports, the vulnerability lies mainly within Microsoft's Jet Database Engine, which is used in the company's professional software applications like Access and Visual Basic.