After a few years of looking at the same thing it was time for a change. Not only is it time for a change in regards to appearance, it is also a time to change CMS. Large far reaching changes…
I am pleasured to say that you all have been subject to my April Fools Day prank. The Story… What made this work so well, is the fact that many of you know I am a pilot. Others of…
Hackers crack more than 60% of breached LinkedIn passwords. More than 60 percent of the unique hashed passwords accessed by hackers from a LinkedIn password database and posted online the week of June 4 were already cracked, according to security…
Microsoft “hardened” its Windows Update system after researchers discovered the Flame virus can infect PCs by offering itself as an update masquerading as official Microsoft software. The worm infected computers in the Middle East and beyond for up to 2…
Conficker camouflages new Windows infections. Windows PCs infected with Conficker are more likely to be compromised by other malware because the worm masks secondary infections and makes those machines easier to exploit, a security expert found. That is the biggest…
An incessant string of spam e-mail campaigns leading to Web sites hosting the Blackhole exploit kit are hitting inboxes around the world in waves. The latest and most prominent ones consisted of the fake Facebook, LinkedIn, U.S. Postal Service, and…
The findings of the latest “Internet Security Threat Report” from Symantec can be summed up as: “Attacks are rising, but the number of new vulnerabilities is decreasing.” This describes the threat landscape in 2011 in which hackers continued to exploit…
Just when we thought the big credit card data breaches were over, atleast for a while (with Alberto Gonzalez put away after his scams at TJX, Heartland Payments and others) – along comes a new one reported today in www.Krebsonsecurity.com….
Criminals are increasingly exploiting a critical hole in the Java Runtime Environment to infect computers with malicious code when users visit a specially crafted Web page. According to a security blogger, the reason for this increased activity is that the…
New exploit uses old Office vulnerability for OS X malware delivery. Some malware groups have recently been found to be taking advantage of an old, patched vulnerability in Microsoft Office for OS X in an attempt to spread command-and-control malware…