compromised

Tue
19
Sep
John Lister's picture

CCleaner Compromised by Hackers - Update Immediately

Users of the popular CCleaner optimization software have been urged to immediately update the program. The software was recently compromised by hackers for almost a month, though it does not yet appear they did any damage. The warning to update is ... particularly important because CCleaner doesn't automatically update - though it does tell users when a new version is ready. The compromised versions were the 32-bit editions of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 . User who currently have these versions should uninstall them immediately, then get the latest copy from the website of ... (view more)

Fri
09
Nov
Dennis Faas's picture

Twitter Demands Users Reset Passwords

It appears that during Tuesday night's election the privacy of a number of high-profile Twitter users was invaded when an unknown website or Internet service compromised their accounts. That prompted Twitter to force password resets on many of its ... users. It remains unclear at the moment how the security breach occurred or how many users' accounts were compromised. Whatever that number, Twitter created a huge stir by sending out more password reset emails than necessary. "We unintentionally reset passwords of a larger number of accounts, beyond those that we believed to have been compromised ... (view more)

Thu
06
Jan
Dennis Faas's picture

New Google Feature Identifies Malware-Infected Sites

For years, hackers have turned the Internet into a never-ending game of " malware roulette," with virtually any web site running the risk of being compromised. In an effort to make the online community a safer place for everyone, Google has ... integrated a new self-identification feature into its search engine to inform users when a website poses a threat. Compromised Websites Weeded Out from Google Search Google created the feature with the average Internet user in mind. If the search engine detects that a website has been altered by a third party, it will display the following message: " ... (view more)

Fri
11
Jun
Dennis Faas's picture

Widespread Web Attack Infects Thousands of Legitimate Sites

Thousands of legitimate websites have fallen victim to a widespread web attack. While the full extent of the attacks remain unknown, security analysts suspect that the hackers used what is called an "SQL injection attack" in an attempt to fool ... legitimate web sites into running malicious database commands. In short, the attack injects malicious HTML content into a web browser while users are viewing an otherwise legitimate site. If the malware is successfully installed, it opens a gateway which allows hackers to remotely control a PC. (Source: networkworld.com ) Up to 114,000 Sites ... (view more)

Wed
31
Mar
Dennis Faas's picture

Massive ID Theft affects 3.3M Student Loan Borrowers

The names, addresses, and Social Security numbers of 3.3 million people were stolen in what is believed to be the largest-ever breach of personal information amongst university students. The issue could affect as many as 5% of all federal ... student-loan borrowers. According to Educational Credit Management Corp. (ECMC), a non-profit guarantor of federal student loans, during the weekend of March 20-21 the personal details of 3.3 millions borrowers were stolen from their St. Paul, Minn. headquarters. The theft did not involve hackers. ECMC spokesman Paul Kelash told the Wall Street Journal that ... (view more)

Wed
27
May
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. The tools are are intended to conceal running processes, files or system data, which allows the intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a Rootkit A rootkit typically hides logins, processes, files, and logs and may include software to ... (view more)

Tue
10
Jan
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. These tools are intended to conceal running processes, files or system data, which helps an intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a rootkit A rootkit typically hides logins, processes, files, and logs and may include software to intercept ... (view more)

Tue
08
Jun
Dennis Faas's picture

Infopackets web server attacked (DDoS)

Dear Infopackets Reader s, Over the weekend, our web server was attacked by hacker(s). Although security was not compromised, the attack resulted in the web server being temporarily shut down until my hosting company could safely implement a data ... mitigation filter to deflect the attack. In a nutshell, the attackers sent a flood of information to the web server and caused it to "choke" on incoming requests. Because the attack originated from multiple IP addresses (I.E.: from more than one computer), this type of attack is referred to as a DDoS attack (or, Distributed Denial of ... (view more)

Subscribe to RSS - compromised