Search engines like Google and Bing index the web. The web contains thousands (millions?) of malware links, either malicious websites or malicious downloads. So it shouldn’t surprise anyone that malware links can be found when searching via a search engine. …Read More »
As I’m sure most dotTechies know, VirusTotal is an awesome online virus/malware scanner that allows users to scan files and programs for viruses or malware using over 40 different anti-virus/anti-malware engines.
VirusTotal historically had a maximum file size limit of …Read More »
Apple may have fixed their password security hole, but you should probably enable two-step verification
Just in case you missed it, Apple made a pretty serious boo-boo on the security front yesterday. The security issue was that Apple’s iForgot password reset tool was made vulnerable to hackers — if they managed to manipulate the URL …Read More »
Is Apple losing its touch? Major security hole allowed hackers to easily reset passwords to Apple accounts using iForgot
There was a time when Apple products were popularly recognized as being secure. Or at least more secure than the competition. For example, for the longest time Mac OS X was synonymous with “doesn’t get viruses” (which, of course, has …Read More »
Internet-wide scan reveals millions of devices are exploitable due to use of default passwords like “admin” or “root”
A researcher, who has chosen to remain anonymous, has performed an internet-wide scan to determine the security level of gadgets like printers, webcams, and set-top boxes all across the world.
The scan was done by using the researcher’s custom-written code …Read More »
Last month, reports surfaced about a bug in iOS 6.1 that would allow anyone to bypass your passcode lock and gain access to your phone. After more than a month’s time, Apple has released iOS 6.1.3 to address the issue. …Read More »
A handful of banks in South Korea have reportedly experienced serious network outages due to a malware attack.
The KBS and MBC networks said that all their computers shut down at 2pm local time, although this did not disrupt or …Read More »
EA’s online video game service Origin is exploitable by bug that lets attackers remotely run malicious code
Video game publisher Electronic Arts recently put out one of the bigger releases of the year in SimCity. The game was plagued with launch woes and continuous server issues as it required an online connection to EA’s Origin service to …Read More »
Last year we wrote a post that provided five tips on how to create strong passwords and have secure accounts. Now I’d like to take the opportunity to provide another password-related tip — the idea that you should use passphrases …Read More »
In the U.S. intelligence community’s annual review of worldwide threats, normally terrorism would be at the top of the list. But now, the nation’s top officials believe that cyber-attacks are now a greater threat to national security than terrorism, organized …Read More »
Anyone who feels Mac “doesn’t get viruses” hasn’t heard of ‘Pintsized.A’, a new trojan that bypasses Mac security measures
Remember that hack marathon earlier this year that saw Apple, Facebook, Twitter, and Microsoft compromised? Yeah, well, the breach occurred courtesy infected Macs. And now researchers have identified the malware that infected these Macs — ‘Pintsized.A’.
Pintsized.A is a new …Read More »
F-Secure, a security firm, has released their Mobile Threat Report for Q4 2012 and the trend is not surprising: Android has a bullseye on its back.
Accounting for a whopping 79% of 301 new malware discovered in 2012, Android is …Read More »
Hackers successfully crack Chrome, Firefox, and Internet Explorer on Windows 8 and Windows 7 at Pwn2Own hacker competition
Chrome OS may have survived a barrage of attacks at Pwnium 3 but Windows and Windows browsers have not been so lucky. At Pwn2Own, a hacker competition sponsored by HP, hackers were able to exploit vulnerabilities in Internet Explorer 10 …Read More »
It would be illogical to claim Chrome OS is uncrackable, without exploits, and the safest operating system around. However, hackers taking part in the Pwnium 3 competition at CanSecWest Vancouver 2013 security conference were unable to crack Chrome OS… despite …Read More »
Bug in Galaxy S III makes lockscreen disappear, allows complete access to phone without password or pattern
Remember that security flaw on iOS 6.1? The one that would allow anyone to bypass your passcode and gain access to contacts and photos? It looks like Samsung’s Galaxy S III has a similar problem, and it might even be …Read More »
Last week two separate instances of Java zero-day vulnerabilities were reported. One, reported by Security Explorations, was not (is not) being exploited in-the-wild as far as anyone knows. The second one, however, was (is) being exploited in-the-wild to infect users …Read More »
After many famous companies admitting that they have been hacked, it is now the turn of Evernote, the market leader in note taking apps. In a post on the official blog, the developers revealed that they “discovered and blocked suspicious …Read More »
Do you still have Java installed? Then you probably want to know that yet another zero-day Java vulnerability is found, and unlike the two vulnerabilities discovered earlier this week by Security Explorations, this vulnerability is being exploited in-the-wild effectively making …Read More »
Normal anti-virus tell you to delete Trojans. Kaspersky? Not so muchRead More »
So you thought you would be safer with Flash gone and HTML5 taking over? Generally speaking, you are probably right — but not in this particular situation. Computer science graduate Feross Aboukhadijeh has demonstrated a proof-of-concept that allows websites to …Read More »
Search warrant reveals just how much the government (or anyone else) can find out about you from your cellphone
Drug dealers, watch out! The government can find a whole lot about you if they seize your phone. As for everyone else, you probably wanna know just how much data your phone is carrying about you regardless of if you …Read More »
Guess what? Adobe Flash is being hit with in-the-wild attacks (again); update to latest version to stay safe
Java. Flash. Java. Flash. Java. Flash. It seems like these two take turns in making your system vulnerable to attack. Sometimes they even misbehave at the same time, like today. As mentioned earlier today, two new vulnerabilities have been discovered …Read More »
This is getting old: New zero-day vulnerabilities found in latest versions of Java, including Java 7 Update 15
Still have Java installed on your computer or enabled in your browser? Then you should know new vulnerabilities have been discovered in the latest versions of Java. Again.
The current latest version of Java is Java 7 Update 15, which …Read More »
Nir Goldshlager runs a “Web Application Security Blog.” He’s also happened to find a variety of security holes and exploits on sites like Facebook, Twitter and PayPal. His latest discovery, however, was a glaring hole in Facebook’s OAuth system: Nir …Read More »
Is the Chinese or Eastern Europeans? Maybe someone else? We don’t really know. All we know is there has been a recent string of hacks against multi-million and multi-billion dollar corporations in the past few months. Microsoft is now the …Read More »
We have had a lot of hacking stories lately on dotTech simply due to a sudden spike in public cybercrime incidents. However, by and large the most recent incidents were either low-key (e.g. Twitter attack hacked) or aimed at the …Read More »
Is China innocent? New reports claim cyber attacks on Facebook, Twitter, and Apple came from Eastern Europe
After recent cyber attacks on high-profile companies like Facebook, Twitter and then Apple, everyone seemed to be pointing fingers at China. But now reports have surfaced claiming that the attacks on those companies originated from Eastern Europe.
An Eastern European …Read More »
Cyberattacks on the US have been traced, and all signs point to the Chinese military and a single building in China [Report]
According to report by the BBC, the origins of the unusually numerous and high-profile attacks on US companies has been found. It is indeed coming from somewhere in China — Shanghai to be exact. But it doesn’t stop there.
According …Read More »
In a statement released yestreday, Apple has disclosed that a number of their employees’ Macs have been compromised by malware through a vulnerability in the Java plug-in for browsers.
The website that was infected and considered responsible for hosing the …Read More »
The Singapore Police Force has reported a sudden rise in the number of “cyber blackmail” cases being reported. The cases are also similar in that the primary target are men, and that they are tricked through social media networks.
There …Read More »
As with most companies nowadays, Burger King has an official Twitter account. (Yes, even dotTech has a Twitter account even though I don’t consider us a company per se.) It is not entirely clear who did it or how they …Read More »
Most of us dislike having toolbars in our browsers because they are annoying; not only do they tend to hijack our homepages, but they use up a lot of screen real estate, making it more difficult to surf the web… …Read More »
The same time the Wall Street Journal, New York Times and Twitter were attacked, there was a fourth company that also fell victim to a “sophisticated attack.”
Facebook, which is home to more than a billion users worldwide, …Read More »
A security flaw on iOS has surfaced that allows anyone to bypass an iPhone user’s passcode and gain access to all their contacts and photos. The bug is claimed to be present in previous versions of iOS as well, but …Read More »
I just wanted to give everyone a head-up that some scumbag is using dotTech’s email to spend spam emails.
If you receive an e-mail from “firstname.lastname@example.org” that is not characteristic of the emails we send (i.e. not an …Read More »