Vulnerability in Google spreadsheets allows cookie stealing

Monday, April 14th, 2008

Security researcher Billy Rios has discovered a vulnerability in Google Spreadsheets which attackers can exploit using links to crafted tables to steal a user's cookie. According to Rios, the victim has to follow such a link in Internet Explorer. The stolen cookie can be used to access all Google services ...

New Crimeware-as-a-Service Market Thriving

Sunday, April 13th, 2008

First it was do-it-yourself malware and phishing toolkits, then it was specialized sites selling stolen FTP credentials and credit card accounts, and now it’s the next phase in cybercrime: crimeware as a service. Researchers at Finjan, MarkMonitor, and Trend Micro are among those seeing a new cybercrime business model, where ...

Is Outsourcing a Security Risk?

Saturday, April 12th, 2008

The world has a new culprit to blame for the rising tide of software vulnerabilities -- code outsourcing. The trend to outsource the coding of applications is now a major contributor to making business software more vulnerable, a survey-cum-report has claimed. According to analyst group Quocirca, which surveyed 250 IT directors and ...

How to Choose a Home PC Backup Method

Friday, April 11th, 2008

It's not only mission-critical business information that should be backed up. The data on your home PC needs to be backed up as well. But how should you choose between the traditional method of saving files on storage media yourself and a newer method of storing your data offsite with ...

Data Security Tips for CIOs: Wiping the Hard Drive

Friday, April 11th, 2008

Security issues are on the minds of all CIOs these days. Whether the CIO of a 1,300-student liberal-arts college or that of a 13,000-employee Fortune 100 company, never before has the issue of data security been more important. Besides a record-breaking year of data breaches, legislation such as Sarbanes-Oxley, Gramm-Leach-Bliley ...