“High Vulnerabilities:abb — interlink_moduleabb — interlink_modulecurl — curlemc — data_protection_advisorfreebsd — libarchiveMedium Vulnerabilities :adastra — trace_mode_data_centerapache — http_servercomodo — comodo_internet_securitydemandmedia — pluck_sitelifeemc — data_protection_advisorLow Vulnerabilities :hp — system_management_homepagerealnetworks — helix_mobile_serversyndeocms — syndeocms…”
Daily Archive: April 23, 2012
“For years, people have been warning about cyber threats involving handheld devices. It's become a perennial issue, one that mobile enthusiasts sometimes do not take seriously enough, despite the best efforts of mobile security vendors. So far, it would be hard to conclude that the mobile banking revolution–if that's what it truly is–has been thwarted by security concerns….”
“At a pre-trial hearing this week in the case of Pfc. Bradley Manning, who is suspected of releasing classified records to WikiLeaks without authorization, a military judge will consider several motions filed by Mannings defense that seek to reduce the charges against him, or to have them dismissed altogether. The defense motions, filed by attorney David E
The comment period forNational Institute of Standards and Technology (NIST) proposed changes to the Digital Signature Standard (FIPS 186-3) is open until May 25, 2012. Submit comments viafips_186-3_change_notice at nist dot gov, with ”186-3 Change Notice” in the subject line. The proposed changes include: clarification on how to implement the digital signature algorithms approved in the standard: the Digital Signature Algorithm (DSA), the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Rivest-Shamir-Adelman algorithm (RSA) allowing the use of additional, approved random number generators, which are used to generate the cryptographic keys used for the generation and verification of digital signatures NIST indicates that the standard provides a means of guaranteeing authenticity in the digital world by means of operations based on complex math that are all but impossible to forge but that updates to the standard are still necessary as technology changes
“DO IT YOURSELF social networking company Ning is reportedly suffering from a slight security problem that could affect 100 million users. Ning lets people set up their own gasbag social networking channels and is used by people like the pop group Radiohead
“The inquest into the death of an 'unhappy' spy, whose body was found locked inside a sports holdall just a week before he was due to leave his job, today heard how police may still bring criminal charges in the ongoing investigation. Gareth Williams, originally from Holyhead in Wales, had been due to leave London and return to the Governments Communications Headquarters in Gloucestershire just a week after his naked, decomposing body was found crammed inside the padlocked bag on August 25 2010
“Iran is investigating a suspected cyber attack on its main oil export terminal and on the Oil Ministry itself, Iranian industry sources said on Monday.
“Voltage Pictures, the makers of the Oscar-winning movie The Hurt Locker, have filed a new lawsuit at a federal court in Florida. By targeting at least 2,514 alleged BitTorrent users, Voltage Pictures hopes to recoup several million dollars in settlements to compensate the studio for piracy-related losses. In total, more than a quarter million people have now been sued in the US for alleged copyright infringements via BitTorrent….”
“As more criminals take to the Internet to search for victims, local police departments are being asked to do more in the world of cyber crime.