n the world of security penetration testing, researchers often rely on stealth and deception when testing a target. At the Defcon security conference in Las Vegas, a new level of penetration testing deception was demonstrated Aug. 8 with a WiFi hacking device that could be hidden in what appears to be a standard carbon monoxide detector casing.
With support for Windows XP now ending, many people are concerned about whether their computers are still secure. Some of those people will also have been relying on Microsoft Security Essentials to protect their PC, as it's freely available.
The good news is that Microsoft will continue to support the XP version of the software up until July 2015. The bad news is that is was never much cop to begin with, with other free anti-virus options performing far better in our tests, and even a Microsoft employee admitted it was supposed to be a 'baseline' product.
More than two million unique login credentials for Australian internet users were stolen as part of the massive haul of 1.2 billion passwords by a Russian hacker outfit.
Earlier this month Hold Security reported that Russian hackers under the group dubbed CyberVors amassed the largest ever cache of stolen website passwords through automated and botnet-driven SQL injection attacks against horribly insecure websites.
When the computer security company Hold Security reported that more than 1.2 billion online credentials had been swiped by Russian hackers, many people were worried—and justifiably so. Hold isn’t saying exactly which websites were hit, but with so many credentials stolen, it’s likely that hundreds of millions of ordinary consumers were affected.
Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected.