Microsoft confirms exploit in Internet Explorer 8

Sunday, May 5th, 2013

Internet Explorer 8 is still the most-used version of Microsoft's web browser family, according to data from Net Applications. Late Friday, Microsoft posted word that it had discovered an exploit in the browser but noted the issue issue does not appear to affect any other versions. Microsoft's Security blog states the exploit could ...

DHS: ‘OpUSA’ May Be More Bark Than Bite

Friday, May 3rd, 2013

The U.S. Department of Homeland Security is warning that a group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign next week known as “OpUSA” against websites of high-profile US government agencies, financial institutions, and commercial entities. But security experts remain undecided on whether ...

More than 90% of passwords are vulnerable to hacks

Thursday, May 2nd, 2013

Even passwords considered “strong” by IT departments are often now vulnerable to hacking,  according to professional services firm Deloitte. In Deloitte’s Technology, Media and Telecommunications Predictions 2013, the firm predicts that 90% of user generated passwords will be vulnerable to hacking this year. Deloitte says that the weakness inherent in current password ...

What’s in a Password?

Tuesday, April 30th, 2013

Nearly every week now we can read about a data breach case somewhere, where millions of user accounts and potential other sensitive data has been compromised. Most people are not even shocked by such news anymore, as it is starting to become humdrum. One of the most common attacks used in ...

Attack hitting Apache websites is invisible to the naked eye

Monday, April 29th, 2013

Ongoing exploits infecting tens of thousands of reputable sites running the Apache Web server have only grown more powerful and stealthy since Ars first reported on them four weeks ago. Researchers have now documented highly sophisticated features that make these exploits invisible without the use of special forensic detection methods. Linux/Cdorked.A, as ...