News (Page 10 of 71)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >
Account pretexters plague Xbox Live
An increasing number of players on Microsoft's gaming system claim their accounts have been stolen by teams of cheaters looking for further advantage.
By: Robert Lemos, SecurityFocus 2007-03-21
http://www.securityfocus.com/news/11452

Anti-spyware bill could mean tougher fines
Supporters of the Spy Act, which heightens civil penalties against those responsible for programs that hijack PCs and collect data without adequate authorization, hope that the bill's third time is a charm.
By: Robert Lemos, SecurityFocus 2007-03-16
http://www.securityfocus.com/news/11450

Tor hack proposed to catch criminals
A security researcher unveils a project that aims to identify sources on the pro-privacy network, but does the initiative help track down criminals or just hurt legitimate users?
By: Robert Lemos, SecurityFocus 2007-03-08
http://www.securityfocus.com/news/11447

Stormy weather for malware defenses
The misnamed Storm Worm, actually a Trojan horse, underscores the difficulties that evolving tactics pose for defenders. The second article in a two-part series.
By: Robert Lemos, SecurityFocus 2007-03-05
http://www.securityfocus.com/news/11446

Maynor reveals missing Apple flaws
Security researcher David Maynor shows off the code for exploiting a vulnerability in the native Mac OS X wireless drivers revealed last summer as well as e-mails showing he notified Apple.
By: Robert Lemos, SecurityFocus 2007-03-01
http://www.securityfocus.com/news/11445

Legal threats scuttle RFID flaw demo
Security technology giant HID uses patent claims to silence a security researcher scheduled to detail issues in radio-frequency identification (RFID) technology at a conference this week.
By: Robert Lemos, SecurityFocus 2007-02-27
http://www.securityfocus.com/news/11444

Google Desktop flaw allows data theft
A security firm warns Google Desktop users to update after the search giant fixes a vulnerability in the program that could allow an attacker to use JavaScript to search for and steal specific data on a user's system.
By: Robert Lemos, SecurityFocus 2007-02-21
http://www.securityfocus.com/news/11443

Imperfect Storm aids spammers
The misnamed Storm Worm, actually a Trojan horse, underscores the evolution of spammers' tactics, including massive attacks on their critics and competitors. The first article in a two-part series.
By: Robert Lemos, SecurityFocus 2007-02-16
http://www.securityfocus.com/news/11442

U.S. calls for more organized cyber response
Federal officials renew calls for the private sector to help manage threats to critical infrastructure and the Internet.
By: Robert Lemos, SecurityFocus 2007-02-08
http://www.securityfocus.com/news/11441

Security pros work to undo teacher's conviction
Researchers aim to recreate what caused a classroom PC to start displaying pornographic pop-ups, an incident that has led to four felony convictions for the substitute teacher involved.
By: Robert Lemos, SecurityFocus 2007-02-02
http://www.securityfocus.com/news/11440

News (Page 10 of 71)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus