code

Mon
20
Feb
Dennis Faas's picture

Google Wallet Payment System Vulnerable to Attack

Google has temporarily suspended one of the features on its mobile wallet system for smartphones following word the platform has at least two serious security flaws. Google Wallet allows users to make payments using "near-field communications," a ... wireless protocol like Bluetooth, but with a maximum range of just centimeters. Users can hold, tap or swipe their smartphone next to a payment device without having to worry about the signal being intercepted. 'Brute Force' Could Break Code The system can be protected with a PIN (personal identification number) code, to prevent misuse when ... (view more)

Fri
27
Jan
Dennis Faas's picture

Symantec Users Urged to Shut Down PCAnywhere

Security firm Symantec is urging all Windows users to disable "PCAnywhere" (a remote-control software program) on their systems immediately. The concern to disable the product dates back to 2006, when Symantec's PCAnywhere source code was stolen, ... but has never appeared in the open until now. Symantec says users running old versions of PCAnywhere could have their systems easily hijacked. A security bulletin on their site says that even the latest edition of PCAnywhere (version 12.5) is "at an increased security threat," and have urged customers to disable the software and ... (view more)

Wed
11
May
Dennis Faas's picture

Skype Preps Patch For Malicious Mac Infection

Online phone service Skype is preparing to fix a bug in the Mac edition of the system that could allow hackers to take control of a computer remotely. The site that discovered the bug has accused Skype of dragging its heels on the issue. Gordon ... Maddern of purehacking.com says he discovered the bug entirely by mistake. He was talking to a colleague on a Skype connection about some code written for a client. To his surprise he was able to make the code run on his colleague's computer. Upon closer examination, Maddern discovered that the hack only worked where the recipient's computer was a Mac ... (view more)

Fri
15
Apr
Dennis Faas's picture

New Trojan Locks Windows, Racks Up Phone Charges

Windows users are being targeted by a new scam that extorts money through long-distance telephone calls, racking up heavy charges. After a victim mistakenly downloads and installs a Trojan onto their PC, the following message is displayed on a ... Windows PC: "This copy of Windows is locked. You may be a victim of fraud or there may be an internal error". While similar messages have appeared before and related to scareware and ransomware scams, the fact that the Windows operating system will not reboot (either in normal mode or safe mode) adds validity to the alleged crisis situation. Victims ... (view more)

Fri
12
Nov
Dennis Faas's picture

'Code Lobster PHP Edition 3.6.2', and 'HD_Speed 1.7.0.87'

Code Lobster PHP Edition 3.6.2 PHP is a programming language for HTML (hypertext markup language) used on web pages. Codelobster PHP Edition streamlines and simplifies the PHP development process. You don't need to remember the names of functions, ... arguments, tags and their attributes. Instead, CodeLobster has implemented it for you in the autocomplete feature for PHP, HTML, JavaScript and even CSS. Also, you can always get necessary help information by F1 or using special Help control. http://www.codelobster.com HD_Speed 1.7.0.87 HD_Speed measures both sustained and burst data transfer rates ... (view more)

Wed
22
Sep
Dennis Faas's picture

Google Beefs Up Online Security Using Cellphone SMS

With many tech analysts predicting that cloud computing will be an important part of how companies conduct their future business, Google has intervened by clamping down on potential hackers and would-be identity thieves. Second Password Code Sent ... via SMS, Cell Phone Using simple passwords for an online account makes you prone to hackers, and this is especially true for corporate accounts. In response to the call for greater security, Google has implemented an additional (and optional) security measure which requires users enter a random six-digit code after entering their password. The random ... (view more)

Tue
31
Aug
Dennis Faas's picture

All Windows Users at Risk of Quicktime Flaw

Shortly after announcing a severe iTunes flaw that affects over 40 Windows applications just last week, it now appears Apple's popular media player, QuickTime, also includes a flaw that could be exploited by hackers to execute malicious code on PCs ... using the Windows operating system (OS). Even systems running more recent versions of the OS, Windows Vista and Windows 7, are vulnerable. "At present the security vulnerability seems to be with users that run Internet Explorer. Given the relative ease with which [the exploit was demonstrated], the chance for drive-by [download] attacks to ... (view more)

Tue
29
Dec
Dennis Faas's picture

Researchers Crack GSM Cell Phone Security

Hackers could soon be listening to your cellphone call. That's the word from the Chaos Communication Conference in Berlin, an annual get-together for hackers. Cryptographers at the conference say they've been able to crack a code that, on a normal ... day, prevents the interception of mobile phone calls by forcing those phones to consistently change frequencies across a list of about eighty channels. Since those not working for a cellphone company would have an almost impossible time knowing the sequence of this frequency change-up, hackers usually have no way of intercepting more than a few ... (view more)

Mon
21
Dec
Dennis Faas's picture

MS Pulls Plug on Blog Service after Cries of Plagiarism

Microsoft has apologized after a contractor appeared to copy code from a rival company to use in a microblogging service. But Plurk, the company claiming its material was stolen, says it is considering taking the matter to court. Juku, a ... Twitter-style blogging feature on Microsoft's MSN site in China, was taken down this week after the complaints. Plurk's staff had written that Juku's design had involved "blatant theft of code, design, and user interface elements." As Much as 80% of Code Stolen Not only did Plurk staff believe Juku's look and feel was remarkably similar to its own site, but ... (view more)

Wed
27
May
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. The tools are are intended to conceal running processes, files or system data, which allows the intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a Rootkit A rootkit typically hides logins, processes, files, and logs and may include software to ... (view more)

Pages

Subscribe to RSS - code