A security researcher has posted an exploit for the Linux on the Full Disclosure mailing list that utilizes three different bugs to permit an attacker to get root access. The exploit was posted by Dan Rosenberg, and affects Linux kernel version 2.6.37. The bugs he used were reported by researcher Nelson Elhage, and include two […]
Attackers hit the Website for MasterCard in an apparent cyber-retaliation for the company’s decision to stop processing donations to WikiLeaks. MasterCard joined a growing list of companies targeted by hacktivists associated with Anonymous, a loosely affiliated group tied to the 4chan message board. The attack was confirmed in a tweet this morning by user @Anon_Operation: […]
Facebook is bringing new privacy controls and visibility to the more than 200 million people accessing the social network through their mobile devices. During the next few weeks, Facebook plans to roll out a new application dashboard to mobile users. According to Facebook, the dashboard will give mobile users a detailed view into what information […]
Compliance mandates are eating up as much as half of the work week for many security pros, according to a survey from eEye Digital Security. For its “2011 Vulnerability Management Trends Report,” eEye surveyed 1,963 IT security pros. More than 85 percent of respondents have compliance mandates, such as the Payment Card Industry Data Security […]
WikiLeaks’ chief spokesman and founder Julian Assange was denied bail after being arrested today by U.K. police for rape and other charges. Assange, 39, stands accused of one count of unlawful coercion, two counts of sexual molestation and one count of rape stemming from incidents involving two women in Sweden this past August. Swedish authorities […]
A new Twitter worm has surfaced that abuses Google’s goo.gl link shortening service. The worm has been seen spreading with the following links: “goo.gl/R7f68” and “goo.gl/od0az.” Twitter is aware of the attack and stated in a tweet that it is pushing out password resets to anyone affected. The microblogging site also advised users to check […]
Microsoft announced plans today to add new protection to block tracking in the upcoming version of Internet Explorer. In IE9, Microsoft plans to implement a TPL (Tracking Protection List), following up on a “Do Not Track” proposal being pushed by the Federal Trade Commission. Last week, the commission released a report backing the creation of […]
A lot is written about protecting the network and safeguarding endpoints, but what about digital copiers? A new brochure from the Federal Trade Commission released Dec. 3 includes tips for businesses on protecting sensitive information stored on the hard drives of digital copiers. Here are some of the tips: ⢠Before acquiring a copier, plan […]
Researchers at the University of California, San Diego, have shined a light on the way some popular Websites sniff browser histories to track user activity. In a paper titled “An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications” (PDF), the group detailed their analysis of Alexa’s global top 50,000 Websites, which they performed […]
Juniper Networks announced today it has bought virtual security vendor Altor Networks for $95 million. The acquisition builds on an existing relationship between the two companies, and Juniper actually invested in the company earlier this year. Founded in 2007, Altor specializes in intrusion prevention, firewall and monitoring for virtual environments. With the purchase, Juniper seeks […]