usb_bug_final_eAfter giving out free USB drives at the AusCERT conference, IBM had to send out an e-mail saying that the drives were infected with malware. Considering that the virus originated on flash drives given out at a security conference from a company that prides themselves on security, this just might be one of the most embarrassing things that could have happened to IBM.

Read More →

router1A blogger helping set up a friend’s Internet connection made the shocking discovery that Time Warner’s wireless routers expose its customers to a huge security gap, making them vulnerable to a hacker. Apparently, Time Warner provided customers with insufficiently protected wireless routers that use the same exact password for every customer. The protection is so poor, that even if the hacker didn’t already know the password, they could easily bypass the javascript protection and retrieve the password, giving themselves access to everything a Time Warner Cable customer does online.

Read More →

eyeimWith the recent release of Mac’s Snow Leopard and the upcoming Windows 7, it’s  only natural that hackers gave their viruses an upgrade as well. According to security company RSA, the Zeus trojan virus now employs the use of instant messaging. After the Zeus trojan has gotten a hold of someone’s account, a hacker will automatically receive an instant message notifying him that that his hack was successful.

Once installed on a PC, the Zeus virus sends the hacker the user’s log-in information and passwords. Then a module, that can be applied to the virus, can search for information specifically concerning financial institutions. A security company called Damballa estimates that the number of PCs that have been infected with the virus are currently at around 3.6 million,  making the Zeus Trojan one of the most aggressive invasive malware viruses around.

Read More →

appleiphoneapps-security2Does your company use the  iPhone 3G (or 3GS) as an important business tool? You may be ecstatic with your fancy new play-toy now, but maybe it’s time to take a long pause and consider the risk involved with the product you are using. According to one prominent iPhone developer and computer hacking expert, the 3G’s enterprise-friendly encryption is extremely weak and very vulnerable to hackers, to the point that it can be cracked in as little as two minutes with the right freeware.

Read More →

microsoft-image Microsoft Corp. may be on the top of the computer business, but it is certainly not perfect, as the company learned Monday July 6th when they had to reveal the details of a computer security threat the company has not taken the steps to fix.

The threat revealed Monday by Microsoft affects Internet Explorer users whose computers run the Windows XP or Windows Server 2003 operating software. This vulnerability allows hackers to remotely take control of any victims machine, after the victim has visited an infected site. Criminals have been exploiting this vulnerability for almost a week, with thousands of sites having been hacked during this time. People travel to these sites by clicking links found in spam e-mails. The threat affects the section of the Microsoft software that is used to play video, and the flaw arises from how the software and Internet Explorer come together with one another. The error in their interaction allows for a hole which hackers can tunnel into.      ie8-logo

Microsoft is telling its users to disable the flawed part of its software to protect their computer. Instructions to do this can be found on Microsoft’s website. Meanwhile, the company will work on a “patch”, or software fix, for the problem.

Read More →