What in the world is GnuGP anyway? How is it used? How does it encrypt text and files? How safe is it?
A new hole, published by chance (read: unintentional) this week, has current PHP developers on their toes. The error, which has existed since at least 2004, is due to a faulty implementation of the CGI specification.
In the August 2011 Symantec Intelligence Report, the company noted there have already been as many new boot time malware threats detected in the first seven months of 2011 as there were in the previous three years. Also known as MBR (master boot record) threats, the malware infects an area of the hard disk that makes them one of the first things to be read and executed when a computer is turned on. This enables the threats to effectively dodge many security defenses.
At the DEFCON 19 hacking conferencea full man-in-the-middle (MITM) attack was successfully launched against all 4G and CDMA transmissions in and around the venue at the Rio Hotel in Las Vegas.
Google Image Search been known to lure users to compromised sites before. A large contributing factor is that these sites often use the WordPress, which is infamous for the great number of security bugs that make it such a perfect target. This once again was pointed out by security researcher Denis Sinegubko, who found over 4000 WordPress blogs hijacked by unknown attackers and filled with popular search keywords and images that redirect users to sites which contain drive by mal-ware download exploits.
Black Hat Apple may have built its most secure Mac operating system yet, but a prominent security consultancy is advising enterprise clients to steer clear of adopting large numbers of the machines.