If you plan to upgrade your computer or just buying some spare parts, you should be careful. As Taipei Times informed, some Maxtor portable hard disks come with “virus preinstalled”.
In Thailand produced drives carried two files that help trojans get into the system: autorun.inf and ghost.inf. Trojans then upload data such as logins and other interesting informations to www.nice8.org and www.we168.org.
We don’t want to talk about possible punishment and jail time/fee someone doing the “bad” things on internet can get, we want to show you how much cash so called ‘blackhat” can get.…
G DATA, a data-company that makes software for securing pc’s just realeased a press note wherethey try to answer the question asked at beggining.
It is well known, not only among community, that after 9⁄11 AT&T allowed surveillance for law enforcement agencies, especially NSA. Many lawsuits after that were filled claiming illegal cooperation with National Security Agency.
Of course it is not only AT&T, that allowed such activities, Already before 9⁄11 there were signs of cooperation between NSA and big companies. Just to remind you, in year 1999 and 2000 there was great debate about so called _NSAKEY.
Misusing emergency services can be sometimes quite expensive. Sometimes you can be jailed for it. Randall Ellis, 19-years old from Mukilteo, Washington is accused from hacking into the county’s 911 system from his home and placing a false emergency call, prompting a fully armed response to the home of an unsuspecting people, OC Register informed.
This technique, known as “SWATting” was seen in U.S. by law enforcement agencies already before. Attacker breaches into emergency system calling for help, then as response SWAT team is called on site. In this case, Ellis pretended to be a teenager shot into shoulder by someone and cocaine overdose case. SWAT with helicopter and dogs responden to this false call in Lake Forest house.
Below you will find list of top 10 web vulnerabilities classified by OWASP, here is also description of the problem and some examples.
I will just give you the list in case you missed it before, i will not comment on any of these as there is already hot discussion about this matter on several sites/forums.
So here it starts: