IP traffic to ‘double’ every two years

Wednesday, June 18th, 2008

Web traffic volumes will almost double every two years from 2007 to 2012, driven by video and web 2.0 applications, according to a report from Cisco Systems. Increased use of video and social networking has created what Cisco calls 'visual networking', which is raising traffic volumes at a compound annual growth ...

Internet-connected coffee maker has security holes

Tuesday, June 17th, 2008

An Australian man has discovered security vulnerabilities in his Internet-connected coffee maker that could allow a remote attacker to not only take over his Windows XP-based PC but also make his coffee too weak. Craig Wright, a risk advisory services manager at professional services firm BDO, found several security holes, including ...

Recovering from the Encryption Virus

Tuesday, June 17th, 2008

Kaspersky Lab has published advice on recovering files encrypted by the frightening Gpcode.ak virus, but there is a big catch -- users must not have turned off their PC first. A new variant of the malware struck last week, scrambling a variety of files on victims' PCs using a very strong ...

OSWA Assistant – Wireless Hacking & Auditing LiveCD Toolkit

Monday, June 9th, 2008

The OSWA-Assistant is a no-Operating-System-required standalone toolkit which is solely focused on wireless auditing. As a result, in addition to the usual WiFi (802.11) auditing tools, it also covers Bluetooth and RFID auditing. Using the toolkit is as easy as popping it into your computer’s CDROM and making your computer ...

How to Harden Your Mac

Wednesday, June 4th, 2008

If you're a quasi-sophisticated Mac user and have been looking for advice on how to better safeguard your machine from hackers or local prying eyes, look no further: Apple has released a massive, 240-page guide that describes various methods for securing the operating system. According to SecurityFocus.com, the manual includes an ...