bob3160
1501
Good thing this didn’t happen in Feb. when some of us where in San Francisco.
Pondus
1502
Not sure if this has already been posted…as Asyn is vacuum cleaning the web for news ;D
4800 Aussie sites evaporate after hack…including backup… D’oh! :-
http://www.smh.com.au/technology/security/4800-aussie-sites-evaporate-after-hack-20110621-1gd1h.html
Pondus
1503
OpenDNS Teams With D-Link to Deliver the Easiest and Most Effective Router-Based Parental Controls Available, Protect Every Internet-Connected Device in the Household
http://www.opendns.com/about/announcements/223/
system
1504
US church websites hacked to post appeal for conversion to Islam
The FBI has launched an investigation after 18 church websites across the United States were hacked and their regular content replaced with an appeal for Christians to convert to Islam.
http://www.barnabasfund.org/US-church-websites-hacked-to-post-appeal-for-conversion-to-Islam.html
system
1505
Taiwan opposition says computers hacked by Chinese
Taiwan's main opposition party said Tuesday its headquarters has been the target of a sustained hacking attack from China and one instance of hacking from the government in Taipei.
http://www.rdmag.com/News/FeedsAP/2011/08/information-tech-taiwan-opposition-says-computers-hacked-by-chinese/
system
1506
SSL VPNs pose network security risks
The use of secure sockets layer (SSL) virtual private networks (VPNs) opens up networks to security risks, according to a white paper by NCP Engineering.
The NCP white paper – Debunking the Myths of SSL VPN Security - warns that vulnerabilities are endemic is SSL to the point where banks have their customer data stolen at “an alarming rate" and "web application developers create a false sense of security by trusting the confidence and credibility of a protocol that is likely to fail them before they can get through a single development cycle.”
http://news.hitb.org/content/ssl-vpns-pose-network-security-risks
system
1507
Fraudster used Facebook to hack bank accounts
A hacker stole £35,000 from his neighbours' online bank accounts after working out the answers to their security questions from information they posted on Facebook and Friends Reunited.
Iain Wood spent up to 18 hours per day online, working out passwords from personal information posted on social networking sites by his acquiantances.
http://www.independent.ie/world-news/europe/fraudster-used-facebook-to-hack-bank-accounts-2848416.html
system
1508
Facebook goes down on November 5…
Oh, what i am going to do now ???
http://www.youtube.com/watch?v=LsbNabK5FDE
http://www.youtube.com/watch?v=aPGYznzgK6M&feature=related
That guy used a tanslator… ???
Asyn
1509
Asyn
1510
Asyn
1511
Asyn
1512
system
1513
[b]Google Admits Handing over European User Data to US Intelligence Agencies[/b]
August 8th, 2011, 15:43 GMT| By Lucian Constantin
Google admits sharing EU data with US government
Enlarge picture
Google has admitted complying with requests from US intelligence agencies for data stored in its European data centers, most likely in violation of European Union data protection laws.
Gordon Frazer, Microsoft UK’s managing director, made news headlines some weeks ago when he admitted that Microsoft can be compelled to share data with the US government regardless of where it is hosted in the world.
http://news.softpedia.com/news/Google-Admits-Handing-over-European-User-Data-to-US-Intelligence-Agencies-215740.shtml
Pondus
1514
Mozilla has now publised version 6 of Firefox.
This version fixes eight vulnerabilities, which Mozilla has set to critical, as well as two high.
http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
system
1515
[size=10pt][b]New malware attack via Facebook[/b][/size]
A tricky approach can cause immense damage
The past days brought a new wave of malware attacks via Facebook to German speaking users. Many users received a message via Facebook’s chat functionality that looked something like this:
http://blog.gdatasoftware.com/blog/article/new-malware-attack-via-facebook.html
system
1516
Most PCs Contain 12 Vulnerabilities
Despite improvements in secure operating systems and security software, most users’ PCs contain on average around 12 different vulnerabilities, according to a Kaspersky Lab Q2 threat study.
Adobe (NSDQ:ADBE) flaws comprised the vast majority of the 10 most common vulnerabilities, followed by Oracle (NSDQ:ORCL)-Sun-Java glitches. Seven of the top 10 vulnerabilities were found in Adobe Flash Player.
http://www.crn.com/news/security/231500321/kaspersky-report-most-pcs-contain-12-vulnerabilities.htm?cid=nl_sec
Asyn
1517
[OT] @Charly: Do you/we really need this huge posts to inform us…?? 
system
1518
Hackers Unlock, Start Subaru Outback With Cell Phone
Solnik and Bailey have not made public the name of the specific software programs and platforms that they targeted with their text-message attack. The Black Hat demonstration was intended to show automakers that should they not take proper security precautions when developing their automotive software, then it is entirely possible that individuals with less than honorable intentions will gain access to more important systems and cause greater damage. For example, the potential for chaos is amplified should hackers sit in the street after hours in front of a dealership and remotely disable vehicle software on a large scale.
http://www.autobytel.com/subaru/news/hackers-unlock-start-subaru-outback-with-cell-phone-102620/
And if this is possible, it is also possible for hackers to turn-off your automobile while you are driving.
system
1519
Beladen Loads Hacked Web Sites With Badness
At least 40,000 Web sites recently were hacked and retrofitted with instructions that silently attempt to infest visitor PCs with malicious software, security experts warn.
Each hacked site redirects to Web sites that bombard the visitor’s PC with about 20 different Web browser vulnerabilities and browser plug-in attacks, targeting older, insecure versions of several third-party applications like QuickTime and Winzip.
This latest mass Web site hack is thought to be separate from a similar recent incident referred to as “Gumblar,” so named because an estimated 60,000 domains hijacked over several weeks redirected visitors to a malware-serving Web site named Gumblar.cn, among others.
If you were to visit one of these sites hacked with the Beladen code, you probably wouldn’t notice anything amiss. In the background, though, malicious code inserted into the site would force your browser to invisibly contact google-analyt1cs.net (please don’t visit this site either), which checks the name of the referring Web site, records the date and time stamp of the visit, and then forwards the victim on to the Beladen site, which then silently attempts to exploit a series of browser vulnerabilities.
http://voices.washingtonpost.com/securityfix/2009/06/beladen_loads_hacked_web_sites.html
Asyn
1520