Massive iPhone Security Flaw Exposes All Private Data

Wednesday, August 27th, 2008

You're a smart, safety conscious iPhone user, right? You keep the phone set to require a 4-digit passcode every time it wakes up, so if you ever lose your baby, all your personal information is safe. But if you are running v2.0.2 of the iPhone operating system, you might as ...

How to Use Honeypots to Improve Your Network Security

Monday, August 25th, 2008

Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used in order to protect communication networks include firewalls, encryption and IDS (Intrusion Detection Systems). The strategy follows the classical security paradigm of "Protect, Detect and React.” In other words, try to protect the ...

Malicious Botnet Stole Bank, Credit Union Credentials

Wednesday, August 6th, 2008

The researcher who first discovered a motherlode of stolen enterprise user names and passwords in June has found that nearly 9,000 of them are bank and credit-card account credentials from around the world that were grabbed by an old but crafty botnet. And it turns out the initial 50 gigabytes' ...

Wi-Fi networks suffer ‘autoimmune’ attacks

Monday, August 4th, 2008

JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...

Freezing the Cold-Boot Attack

Friday, August 1st, 2008

A security expert who helped pioneer some of the research behind the recent cold-boot attack discovery by researchers at Princeton University will reveal next week at Black Hat USA the technical details of methods he developed for protecting an encrypted laptop from the hack.The software-based techniques defend against so-called cold ...