Mindblown: a blog about philosophy.

  • QuickTime flaw could open Windows PCs to hackers

    Firefox users most vulnerable; Internet Explorer users should be wary too. Polish security researcher Krystian Kloskowski has published a proof-of-concept exploit for a vulnerability in Apple ‘s QuickTime media player. The exploit, which makes use of a vulnerability in the way the RTSP-protocol is handled by QuickTime , could give hackers access to PCs that…

  • Five-year-old design flaw found in all Windows versions

    Microsoft engineers spend Thanksgiving holidays writing patch. During the Kiwicon conference earlier this month, ethical hacker Beau Butler from New Zealand disclosed a design flaw in Windows that could potentially affect millions of users. Said flaw seems to have been first discovered and, apparently, fixed more than five years ago, but this fix has turned…

  • One in four consider online banking unsafe

    Virus Bulletin finds that one in four users consider online banking to be unsafe, but manage their accounts online regardless, while 50% of users consider online banking to be risk free. In a survey of more than 370 visitors to www.virusbtn.com – many of whom are security professionals – a mere 23% of users said…

  • Two fixes released on lightweight Patch Tuesday

    Monthly security update covers just couple of dangers. Microsoft has released its monthly ‘Patch Tuesday’ security bulletin, with only two patches issued, one rated ‘Important’ and the other ‘critical’. The more serious flaw, a problem with URI validation, has been publicly disclosed and can be used to remotely compromise a system. While exploitation methods have…

  • Pushy scamware ads served by DoubleClick

    Advertising network provided ads for rogue security product. Online advertising system DoubleClick , part of an ongoing acquisition attempt by Google , has allowed a wave of extortion trojans to be pushed out via its ad network, appearing on numerous trusted websites for some time before being stopped earlier this week. The scamware, a version…

  • Infected Seagate hard drives sold in Taiwan

    External Maxtor disks shipped carrying autorun datastealer. A shipment of Maxtor external hard drives, produced in Thailand by US-based Seagate and sold in Taiwan, has been found to be infected with Autorun trojans designed to gather sensitive data from machines connected to the storage devices. The high-capacity (300GB and 500GB) drives in the Maxtor Basics…

  • US botnet master confesses to crimes

    Security consultant to plead guilty, could face heavy sentence. A Los Angeles man has agreed to plead guilty to several counts of fraud and unauthorised interfering with computer systems, having built a botnet comprising up to 250,000 machines, installing adware and using harvested data to defraud money from bank accounts, both directly and via PayPal…

  • Russian Business Network leaves Russia

    Leading cybercrime hosting hub moves business to fresh pastures. The notorious Russian Business Network (RBN), recently making headlines for the massive amounts of malicious and criminal content passing through its servers, has suddenly shut up shop in its St. Petersburg base and apparently moved its services to other countries. A Trend Micro blogger, writing earlier…

  • Phished Salesforce.com data used for phishing attacks

    Password leak leads to major CRM customer data haul. A security breach at customer relationship management (CRM) firm Salesforce.com has led to a large-scale leak of confidential user data, which has been put to use for targeted phishing attack posing as Salesforce invoices. Salesforce offer a software-as-service platform for CRM, covering sales and marketing information…

  • LinkedIn providing open redirect

    Lax website setup could be used to trick the unwary. Popular professional networking system LinkedIn has been allowing free redirects from its website, providing spammers and phishers with a way of providing links which appear to lead to the contact system but instead take victims to malicious or deceptive sites. The practice of using genuine…

Got any book recommendations?