Popular networking standard places as many as 50 million IPs at risk of one of three attacks, researchers say.
Researchers at Rapid7, a provider of vulnerability management, compliance, and penetration testing solutions for web applications, network, and database security, warns that the popular Universal Plug and Play (UPnP) protocol is flawed, exposing tens of millions of network devices to at least one of three different types of attacks. More than 23 million Internet-connected devices are vulnerable to remote code execution through a single UDP packet, along with tens of millions more via remote discovery on the web.
Hacking group takes credit for attack on U.S. Department of Justice's website.
The hactivist organization known as Anonymous is claiming it's the one responsible for infiltrating the U.S. Department of Justice's Sentencing Commission website (www.ussc.gov) over the weekend. This latest attack was in retaliation to the government's attempt to prosecute Aaron Swartz for illegally downloading millions of academic journals from JSTOR, an online archive and journal distribution service.
Tell us which AV programs you want to see included in this year's roundup!
Straight and to the point, we need your help. You see, we're getting ready to conduct our annual roundup of Internet security suites, and we thought we'd try something a little different this year. Rather than pick which programs we think you'd be most interested in reading about, we're letting YOU tell US which ones to include. That's right, you wield the power -- how will you use it?
ESET upgrades its flagship consumer security products.
ESET, the well-regarded security firm headquartered in Bratislava, Slovakia, dropped us a note to let us know it launched its Smart Security 6 Internet suite and NOD32 Antivirus 6 security software. Both products received enhancements in threat detection, more thorough cleaning of infected systems, and an improved user experience, ESET said.
McAfee predicts rapid evolution of cyberthreats in 2013.
If you thought Windows 8 would provide refuge from an increasingly malware infested web, think again. Security firm McAfee has just released its annual Threat Predictions report in which it highlights the top threats it foresees for the coming year, and like it or not, Windows 8 is going to be a major target. Despite improved security in Windows 8, McAfee believes targeted malware will be available faster than it was for Windows 7.
Contrary to its popularity, "password" is not a good password.
Forget about the usual New Year's resolutions to lose weight, eat healthier, exercise more, and all those other promises that fizzle out by February. A vow we can all keep is to practice better PC security habits, and it starts with picking out passwords that aren't incredibly easy to guess. Need some help? Just have a look at a list of the worst passwords of 2012, as compiled by SplashData.
Chrome plans to add a feature so obvious, we wonder what took so long.
If you’ve ever downloaded a free app to use on your PC, it’s probably happened to you. The installation goes great, the program works as advertised (or doesn’t), but it isn’t until you open a browser window that the true cost of using that free app is realized. Freeware tools love to install obnoxious tool bars, search engine replacements, and the most insidious ones install extensions with missions completely unknown to the user. For applications like Skype this can add useful functionality such as click to dial, but more often than not, silently installed extensions do more harm than good. That’s why we were ecstatic to learn that Google is finally tackling the problem head on with Chrome 25, and will hopefully inspire the other major browser makers to take action as well.
Ten years ago a group of four Microsoft engineers took to the stage at a security conference in Washington, DC, and presented a paper titled “The Darknet and the Future of Content Distribution”. In this paper, the authors made a compelling argument describing how the rise of information technology would make it easier and faster for people to share files, and how DRM would do little to slow the process down. At the time this premise was a bit controversial, and as the authors openly admit, it almost cost them their jobs.