What in the world is GnuGP anyway? How is it used? How does it encrypt text and files? How safe is it?
A new hole, published by chance (read: unintentional) this week, has current PHP developers on their toes. The error, which has existed since at least 2004, is due to a faulty implementation of the CGI specification.
In the August 2011 Symantec Intelligence Report, the company noted there have already been as many new boot time malware threats detected in the first seven months of 2011 as there were in the previous three years. Also known as MBR (master boot record) threats, the malware infects an area of the hard disk that makes them one of the first things to be read and executed when a computer is turned on. This enables the threats to effectively dodge many security defenses.
At the DEFCON 19 hacking conferencea full man-in-the-middle (MITM) attack was successfully launched against all 4G and CDMA transmissions in and around the venue at the Rio Hotel in Las Vegas.