Posted by Vlad Ionesi on October 13, 2009 ·
It looks like Yahoo collaborated with Iran during the election protests, releasing 200,000 email addresses and names of people who have or had blogs. When Iranians protested on the streets, the authorities blocked or restricted access to many Internet sites, including Yahoo and Google. While Google’s problem was solved in less than 48 hours, Yahoo representatives had to meet with Iranian authorities. [...]
Posted by Vlad Ionesi on August 11, 2009 ·
As you all know, WordPress has just released the new 2.8.3 update. While boosting its capabilities, the update also weakens WordPress’s security with a dangerous vulnerability. And this is not just something to play with. Blog owners can literally be locked out of their administrator accounts. Hackers will use the online password reset function to reset the admin password, leaving the blog owner [...]
Posted by Vlad Ionesi on August 3, 2009 ·
If you recall one of our latest news, Apple’s iPhone has its share of problems. One very big problem is a security hole that can be used by hackers to send spam, malware, and other malicious packages to and from your iPhone. Fear no more, the fix is here!
This security problem can now be fixed by applying the iPhone OS 3.0.1 update released Friday. However, it is available only through the latest [...]
Posted by Vlad Ionesi on July 31, 2009 ·
Danger! Your Apple iPhone can be targeted by hackers! They can break into your iPhone and deliver malware, intercept messages, or track your keystrokes. This is achieved by launching a Denial of Service (DoS) attack through the SMS protocol. Through this DoS attack, the hacker can take control of any iPhone. Why? To steal sensitive information, send spam and malware, or just keep you off the network.
“Its [...]
Posted by Ruk Cooray on July 23, 2009 ·
Adobe is investigating reports of vulnerability in Flash being exploited. It looks like, after malicious Acrobat PDF files get on a computer, they start exploiting the vulnerability to drop a Trojan onto it. Flash is a very popular add-on to most browsers and is also available in PDF files. Symantec stated that any software that uses Flash could come under attack until a fix is released. Adobe stated [...]
Posted by Ruk Cooray on July 17, 2009 ·
Image via Wikipedia
Tuesday was one of the most difficult days for the popular micro-blogging website Twitter, after a hacker gained access to their Google cloud-based Apps platform and managed to steal over 300 confidential documents and screenshots. These sensitive documents were sent to Techcrunch, where Michael Arrington decided to release some of them to the public.
But how was this possible? [...]