Ohio State University database hacked

Ohio State University database hacked


Ohio State University database hacked

Posted: 16 Dec 2010 07:11 AM PST

A database containing Social Security numbers, addresses and dates of birth of everyone who's ever had an Ohio State University e-mail address (@osu.edu) has been breached by unknown perpetrators but,...

Mozilla expands its bug bounty program

Posted: 16 Dec 2010 06:35 AM PST

Back in 2004, the Mozilla Foundation instituted a bug bounty program that rewarded users who reported critical security vulnerabilities on the Foundation's software with $500 per bug. Six years later,...

Twitter spam campaign leads to computer-hijacking rogue AV

Posted: 16 Dec 2010 05:59 AM PST

Malicious shortened goo.gl links and compromised accounts are once again used to lure users to pages that will ultimately harm their computer. A message saying "a very good antivirus" and offering ...

Malicious .rtf file exploits MS Office flaw

Posted: 16 Dec 2010 04:03 AM PST

A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted systems. The flaw has been ...

MySQL 5.5 released

Posted: 16 Dec 2010 04:02 AM PST

MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including Windows, Linux, Oracle Solar...

After the 2010 security tsunami, tips on how to survive 2011

Posted: 16 Dec 2010 12:09 AM PST

In-house and internal threats will be a big element of 2011 as organizations begin to understand that anti-virus, malware, and phishing software is no longer effective. There will be an epiphany that ...

Voice encryption app for the iPhone

Posted: 15 Dec 2010 10:45 PM PST

Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA encryption during the sym...

Metasploit 3.5.1 adds Cisco device exploitation

Posted: 15 Dec 2010 10:12 PM PST

Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an organization's password securi...

Ten tips for smartphone security

Posted: 15 Dec 2010 09:21 PM PST

With the holiday season in full swing, more people are using their smartphone for tasks such as last minute shopping, accessing bank accounts, connecting with friends or making shopping lists on their...

Network access control system PacketFence 2.0 released

Posted: 15 Dec 2010 09:03 PM PST

PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks - from small to very large heterogeneous networks. PacketFence has been deploye...

0 comments:

Post a Comment