of 172 page(s)
January 7, 2014
Facebook, the popular social network with over a billion users world wide, has just been hit with a class-action lawsuit.
The allegations, revealed in the FT, are that Facebook systematically scans the content of private messages so it can sell the data to third parties such as advertisers. Facebook's entire business model is based on the fact that it monitors what users write, like and up-load in order to sell this information on to others. I have covered some of the concerns about this in my articles 'How Facebook Exploits Your Private Information' and 'How Facebook Likes Reveal Your Intimate Secrets'. In principle, there is nothing wrong with Facebook using our data to make commercial gains. In the end, the service is free and Facebook has to make money somehow. However, my biggest concern is that the data mining activities are not as transparent as they should be.
"Blackhole" Exploit Kit DGA Analysis
by Opendns Security Research
July 10, 2012
What is the "Blackhole" Exploit Kit?
A very popular and customizable kit to exploit a range of client vulnerabilities via the Web. Hackers license the kit (or rent an already exploited site) to cyber criminals. Cyber criminals compromise Web pages and embed an invisible iFrame. Potential victims visit a compromised Web page and are redirected to the hosted exploit. If the victim has one of the targeted client vulnerabilities, their device is infected. OpenDNS's enforcement is device-, application-, protocol- and port-agnostic so all our users are protected.
"But The Client Wants IE 6 Support!"
by Lea Verou
November 3, 2011
Frequently, when I discuss CSS3 with other developers, the issue of stubborn clients comes up.
They tell me that even though they personally don't think a website should look the same in all browsers and they're eager to try all of these new techniques, their clients insist that their website should look the same, so the developers are stuck with the same Web development techniques that we used five to ten years ago. Their clients just don't "get" graceful degradation. Is this really the issue? Are our clients incapable of understanding these things?
"exe" read backwards spells "malware"
by Lordian Mosuela
August 18, 2011
RIGHT TO LEFT OVERRIDE (RLO) is a unicode control character (U+202E) that reverses the character reading order from the traditional left-to-right, to right-to-left.
We reported this trick last year but it has resurfaced extensively in the past week to trick users into opening malware executables. Malware uses RLO to reverse the direction of text in a filename. This can make an "exe" file appear to be a harmless "doc" file. These new variants of the Bredolab virus are distributed via emails that have a subject line similar to "inter-company invoice".
"Fetch as Googlebot" tool helps to debug hacked sites
by Matt Cutts
August 2, 2012
One of the most tenacious blackhat webspam techniques we continue to see is hacked sites.
I wanted to remind site owners that our free "Fetch as Google" tool can be a really helpful way to see whether you've successfully cleaned up a hacked site. For example, recently a well-known musician's website was hacked. The management firm for the musician wrote in to say that the site was clean now. Here's the reply I sent back...
"Hacked By Turkish Hackers"?
June 21, 2010
For the past 12 hours, over 1000 Twitter accounts have been hacked with an unknown method.
"Privacy is a way of managing information flow."
October 18, 2011
Why are people so willing to give away their personal information to complete strangers?
It's because humans want to share information. And in fact, they share information a lot more freely than other "things" such as goods and services. Which of these are you most likely to provide without thinking much about it?...
"Ransomware" on SourceForge project sites
February 8, 2013
You may have seen an article yesterday about "ransomware" on SourceForge and Github websites.
The exploit in question leads victims to fake sites, where their PCs are then infected with the offending malicious ransomware. First, we would like to state that no malware in this instance was hosted on SourceForge, but rather the content on SourceForge linked to malware hosted off-site. We wanted to also assure you that within minutes of becoming aware of the problem, our team here at SourceForge, had removed the offending content and blocked the addresses from which it was being created. Likewise, it's apparent that our peers at Github took similar actions to address the problem.
"Stuxnet" Designer Should Be Person of the Year
by Philip Klein
December 15, 2010
Today, Time magazine gave its "Person of the Year" honor to Facebook founder Mark Zuckerberg, but another computer programer may have had a far greater impact on world events...
...the person (people?) who designed the "Stuxnet" virus that by a number of accounts has been a huge setback to the Iranian nuclear program.
The Jerusalem Post has spoken with the German computer whiz who has been studying the virus, and he's concluded...
"The ABUSE Is That The Govt Is Collecting This In The First Place Without Suspicion Of Wrong Doing!"
August 10, 2013
Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.