Blog Posts Tagged with "Browser Security"

69dafe8b58066478aea48f3d0f384820 Spreading Malware via Invisible iFrame

May 18, 2011 Added by:Headlines

The main page of the site - including the "Homepage" and the "About Us" section - contain an invisible iframe with JavaScript downloaded from sites contaminated by a custom set of exploits. The malicious code attempts to take advantage of vulnerabilities on the end user’s machine...

Comments  (1)


Vupen Security: The First Pwn Troll Business?

May 16, 2011 Added by:Keith Mendoza

I don't know what credibility Vupen has left as a company in the eyes of the information security industry. They're actions are no different from patent trolls or the many script kiddies who troll around the web showing their half-baked warez...

Comments  (0)


How to Recognize and Analyze a Fake Anti-Virus Message

May 05, 2011 Added by:Dan Dieterle

Trying to figure out how I was redirected to this fake AV site from clicking on a Google image, I found something interesting. Hovering over the picture, I noticed that the website that showed up under the image looked legit, but the image URL pointed to a completely different website...

Comments  (1)


Cookies and Your Privacy: Past, Present and Future

April 24, 2011 Added by:Theresa Payton

If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...

Comments  (0)


Microsoft Issues Advisories for Chrome and Opera

April 20, 2011 Added by:Headlines

The first vulnerability affecting both browsers could have allowed access to private information. The second one that affected only Chrome exploited a weakness in how the browser accessed memory, and could have allowed an attacker to execute code within the Google Chrome Sandbox...

Comments  (0)


Digital Certificates Only Provide the Illusion of Security

April 11, 2011 Added by:Headlines

“Right now, it's just an illusion of security. Depending on what you think your threat is, you can trust it on varying levels, but fundamentally, it has some pretty serious problems..."

Comments  (0)


Videos and Multimedia are Most Popular Malware Traps

April 01, 2011 Added by:Headlines

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."

Comments  (0)


Google Adds Security to Search

February 08, 2011 Added by:Robert Siciliano

"Now we’re expanding the search results notifications to help people avoid sites that may have been compromised and altered by a third party, typically for spam. When a user visits a site, we want her to be confident the information on that site comes from the original publisher..."

Comments  (2)


Safeguarding Your Data From Hackers and Intruders

January 31, 2011 Added by:Brent Huston

Browsing the Internet is fun, entertaining, and often necessary. Web browsers are also a ripe playground for nefarious activity which means the more risky places you visit, the bigger the chance that you’ll face some sort of danger...

Comments  (0)


Facebook's Third Biggest Advertiser Was a Spammer

January 19, 2011 Added by:Headlines

It seems unlikely that Facebook and Microsoft would be clueless as to the unsavory nature of Make-My-Baby and MakeMeOld's business practices given the level of revenue they generated. Sometimes it just takes a few good bloggers to keep multi-billion dollar companies on the straight and narrow...

Comments  (0)


On IT Security History and Architecture

January 17, 2011 Added by:Dr. Steve Belovich

There are no quick fixes to this growing problem. One thing, however, is almost certain: The growing body of lawsuits on identity theft, medical record theft, software security, safety and reliability issues will lead to federal and/or state regulation...

Comments  (0)


Is Truly Anonymous Web Browsing Even Possible?

January 13, 2011 Added by:Rafal Los

On one end of the argument you must concede that in order to have an acceptable user experience you must be tracked to some acceptable extent, while the other end of the argument would say that we don't want web sites, vendors and nation-states/organizations tracking us and our browsing habits...

Comments  (3)


Google and Microsoft Clash Over IE Fuzzer Release

January 04, 2011 Added by:Headlines

Did a Google staff researcher jump the gun by releasing a tool that identifies dozens of exploitable bugs in Internet Explorer before critical patches were available, or did Microsoft drop the ball back in July by not addressing the problems when first presented to them? A cyber-drama is playing out...

Comments  (0)


How to Safely Use a PC and the Internet

December 23, 2010 Added by:Brent Huston

It’s human nature to fear the unknown. We don’t like to deal with things we don’t understand. Once upon a time, it might have been ok to just avoid what we didn’t know. But today’s world is becoming more and more reliant on machines, computers, and the Internet...

Comments  (0)


Browser Flaw Allows Website History Sniffing

December 06, 2010 Added by:Headlines

Researchers have discovered a vulnerability that allows harvesting of the browser histories for Firefox and Internet Explorer users. The flaw lets websites that contain some simple code to see what websites visitors have been to, and enables detailed profiling of users web habits...

Comments  (0)


W3C Buries Web SQL Database Standard

December 03, 2010 Added by:Rafal Los

Although I keep saying that things are most secure when they're simple the new specification is orders of magnitude more complex - more documentation, moving parts, bits - than the Web SQL Database which had security as a principle. What could possibly go wrong, right?

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »