Anti-spyware bill could mean tougher fines
Supporters of the Spy Act, which heightens civil penalties against those responsible for programs that hijack PCs and collect data without adequate authorization, hope that the bill's third time is a charm. 2007-03-16 http://www.securityfocus.com/news/11450 Phisher 'Vladuz' dodges eBay's defenses A malicious hacker has seemingly gained unauthorized access to parts of eBay's network for the third time in as many months, despite the best efforts of the company's security team. 2007-03-14 http://www.securityfocus.com/news/11449 eBay goes hacker hunting in Romania More than two months after breaching eBay's employee servers, a hacker who calls himself Vladuz continues to dodge the online auctioneer's security team and U.S. and European authorities. 2007-03-09 http://www.securityfocus.com/news/11448 Tor hack proposed to catch criminals A security researcher unveils a project that aims to identify sources on the pro-privacy network, but does the initiative help track down criminals or just hurt legitimate users? 2007-03-08 http://www.securityfocus.com/news/11447 Stormy weather for malware defenses The misnamed Storm Worm, actually a Trojan horse, underscores the difficulties that evolving tactics pose for defenders. The second article in a two-part series. 2007-03-05 http://www.securityfocus.com/news/11446 Maynor reveals missing Apple flaws Security researcher David Maynor shows off the code for exploiting a vulnerability in the native Mac OS X wireless drivers revealed last summer as well as e-mails showing he notified Apple. 2007-03-01 http://www.securityfocus.com/news/11445 Legal threats scuttle RFID flaw demo Security technology giant HID uses patent claims to silence a security researcher scheduled to detail issues in radio-frequency identification (RFID) technology at a conference this week. 2007-02-27 http://www.securityfocus.com/news/11444 Google Desktop flaw allows data theft A security firm warns Google Desktop users to update after the search giant fixes a vulnerability in the program that could allow an attacker to use JavaScript to search for and steal specific data on a user's system. 2007-02-21 http://www.securityfocus.com/news/11443 Imperfect Storm aids spammers The misnamed Storm Worm, actually a Trojan horse, underscores the evolution of spammers' tactics, including massive attacks on their critics and competitors. The first article in a two-part series. 2007-02-16 http://www.securityfocus.com/news/11442 U.S. calls for more organized cyber response Federal officials renew calls for the private sector to help manage threats to critical infrastructure and the Internet. 2007-02-08 http://www.securityfocus.com/news/11441 |
|
Privacy Statement |