Just as breaking into a bank is pointless without a getaway plan, so too is breaking into a network without the ability to sneak away with data. The exfiltration stage of data theft often garners less attention than the methods used to infect computers, but is no less important. At Black Hat DC, Sean Coyne, […]
Oracle has ended MySQL support for a number of operating system versions that have reached end-of-life or were in low demand. In an announcement, Oracle notified users of the end of support for all MySQL binaries for Microsoft Windows 2000 as of Jan. 6. In addition, as of Jan. 1, Oracle has stopped building MySQL […]
A former contractor working at the U.S. Transportation Security Administration (TSA) was sentenced to two years in prison for tampering with federal databases after he learned he was being fired. Douglas James Duchak, 47, was sentenced Jan. 11 by U.S. Circuit Court Judge David M. Ebel. He was also ordered to pay more than $60,000 […]
RapidShare has reacted harshly to a report characterizing the file-hosting site as a home for pirated content. In a study released Jan. 11, researchers from MarkMonitor crawled the Web for sites offering counterfeit and pirated digital content tied to 22 high-profile brands. The results included 43 unique Websites classified as digital piracy sites. An additional […]
With more and more SAP systems getting connected to the Web, the security landscape for many organizations is changing. Just how much-and what those changes mean-will be highlighted at the upcoming Black Hat DC conference by Mariano Nu??ez Di Croce, director of research and development for Onapsis. “If we think about the common goals and […]
SAP announced Jan. 12 it will acquire a chunk of SECUDE’s security business in order to bolster its identity management capabilities. The deal, made for an undisclosed sum, brings the security software, identity and access management software and other related assets of SECUDE into the SAP portfolio. In particular, the deal is focused on SECUDE’s […]
A popular Chinese online marketplace has removed 50,000 Apple iTunes accounts being offered on its Website following a controversy that erupted last week. The decision by Taobao follows a Jan. 6 report by the Global Times that revealed the accounts were available for between 1 and 200 yuan, which is equivalent to roughly 15 cents […]
Any holiday cheer created by the decline in spam is likely to soon disappear-if it hasn’t already. Driven by the infamous Rustock botnet, spam has begun to tick upward again. Before Christmas, Rustock was accountable for as much as 44 billion spam e-mails per day, according to Paul Wood, MessageLabs senior intelligence analyst for Symantec […]
Microsoft issued two security bulletins to fix three Windows vulnerabilities, getting Patch Tuesday off to a slow start in 2011. Only one of the bulletins is rated “critical.” That bulletin, MS11-002, covers two vulnerabilities affecting Microsoft Data Access Components. The first of the bugs exists in the way MDAC (Microsoft Data Access Components) validates third-party […]
New research from MarkMonitor revealed just how much traffic Websites selling counterfeit and pirated content can generate. In a study, MarkMonitor searched the Web for sites believed to be offering counterfeit and pirated digital content tied to 22 well-known brands. The results were narrowed down to include 43 unique sites tied to digital piracy and […]