-
I am facinated by SQLite. But before you say “Mike you really need to get out more and get a life! ” consider this -the two most popular smartphone operating systems of today, iOS and Android, use SQLite databases to store important information such as contacts, SMS, and call records. That’s a lot of users… Read more »
-
English-Italian Translations
Security hole could affect 99% of Android smartphones
Posted on by adminAccording to German researchers, 99% of Android devices might be at risk from a vulnerability which could allow unauthorised parties to snoop on your Google Calendar and Contacts information. The discovery by the University of Ulm researchers brings to light a serious privacy issue, and underlines the difficulty that many Android smartphone owners appear to… Read more »
-
The stealing of hotel towels isn’t a big problem in the scheme of world problems, but it can be expensive for hotels. Sure, we have moral prohibitions against stealing — that’ll prevent most people from stealing the towels. Many hotels put their name or logo on the towels. That works as a reputational societal security… Read more »
-
English-Italian Translations
Facebook Dislike button spreads fast, but is a fake – watch out!
Posted on by adminDon’t be too quick to click on links claiming to “Enable Dislike Button” on Facebook, as a fast-spreading scam has caused problems for social networking users this weekend. Messages claiming to offer the opposite to a like button have been appearing on many Facebook users’ walls: Facebook now has a dislike button! Click ‘Enable Dislike… Read more »
-
A scary development in rootkits: Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the OS. Doing so forces the OS to present inaccurate results to detection software (anti-virus, anti-rootkit). For example rootkits may hide files, registries, processes, etc., from detection software. So rootkits typically… Read more »
-
Facebook users are being tempted to click on links to what purports to be a video of Osama bin Laden being shot, in the latest in a series of scams exploiting the hot news story of the Al Qaeda leader’s death. The messages appear as follows: Watch the Osama Shoot down video Osama Dead -… Read more »
-
Recently, I helped one company to remediate security problems with their four websites. It was quite an usual iframe injection attack. FTP logs clearly showed how attackers used FTP to infect legitimate files on server. So the question was, how could FTP credentials be stolen? Of course, I pointed them to my blog post where… Read more »
-
The naming of cats is a difficult matter It isn’t just one of your holiday games. – T S Eliot, The Naming of Cats For the next cycle, I think we’ll leave the oceanic theme behind. The “oddball octopus”, for example, is a great name but not one we’ll adopt this time around. Perhaps in… Read more »
-
English-Italian Translations
Facial recognition software that blurs your sensitive data when you’re not looking at it
Posted on by adminWell, here’s a whole different kind of “endpoint security” from the usual. A product called “PrivateEye” uses your computer’s webcam to identity your face. While you’re sitting in front of your PC and looking at the screen, PrivateEye’s facial recognition software knows not to do anything – but as soon as you look away, the… Read more »
-
English-Italian Translations
New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”
Posted on by adminWe have found a new type of financial malware with the ability to hijack customers’ online banking sessions in real time using their session ID tokens. OddJob, which is the name we have given this Trojan, keeps sessions open after customers think they have “logged off”’, enabling criminals to extract money and commit fraud unnoticed. … Read more »
Close