Monday, August 11, 2008

Facebook stamps out malware attack

Facebook has blocked a malware attack targeting its users Read More

According to the results of an RSA survey, 54% of respondents have addressed a security incident but only 11% reported it. Based on what we see reported in the news,... Read More

At some point, the United States Customs and Border Patrol decided that the current administration's blatant disregard for the Constitution of the United States trickles down to them as well... Read More

For July, Microsoft released only 4 new Security Bulletins and none of them were Critical. Actually, all 4 were rated as Important, which typically means they are serious, but that... Read More

Analysis of Trade Me jobs shows tech pays well Read More

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

Massachusetts Bay Transportation Authority filed a lawsuit on Friday seeking to stop presentation Read More

The next year is about consolidation, says MD Read More

The Microsoft MJPEG codec is vulnerable to multiple stack-based buffer overflows when parsing specially crafted files. A remote attacker could overflow the buffer and execute arbitary code within the context of the user viewing the malicious file. Read More

SaaS model will challenge Microsoft, Google's enterprise head says Read More

No comments: