Monthly Archives: May 2012

Malware Installed On Travelers’ Laptops Through Software Updates On Hotel Internet Connections


May 8, 2012 By
The Vigilant Application Owner

May 8, Internet Crime Complaint Center – (International) Malware installed on travelers’ laptops through software updates on hotel Internet connections. Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms, the Internet Crime Complaint Center reported […]

Continue reading...

Node.js Update Fixes Information Disclosure Vulnerability


By
The Vigilant Application Owner

May 8, H Security – (International) Node.js update fixes information disclosure vulnerability. The Node.js developers are advising all users to upgrade to the latest stable release of their JavaScript-based, event-driven, application framework as soon as possible. Version 0.6.17 of Node.js closes a security hole in Node’s HTTP implementation that could be exploited by a remote […]

Continue reading...

Attackers Target Unpatched PHP Bug Allowing Malicious Code Execution


May 7, 2012 By
The Vigilant Application Owner

May 7, Ars Technica – (International) Attackers target unpatched PHP bug allowing malicious code execution. A huge number of Web sites are endangered by an unpatched vulnerability in the PHP scripting language that attackers are already trying to exploit to remotely take control of underlying servers, security researchers warned. The code-execution attacks threaten PHP Web […]

Continue reading...

Selecting OSS Components: Three Questions Answered by Nexus Pro


By
Tim O'Brien

There are over 400,000 components in the Central repository including everything from servlet containers like Apache Tomcat to critical application infrastructure like Spring and Hibernate.    When you are designing an application or trying to update an application’s dependencies, how do you choose which component to use? Here’s an example of a decision you may […]

Continue reading...

Hackers Blackmail Belgian Bank With Threats to Publish Customer Data


By
The Vigilant Application Owner

May 3, IDG News Service ­ (International) Hackers blackmail Belgian bank with threats to publish customer data. Hackers claimed to breach the systems of the Belgian credit provider Elantis and threatened to publish confidential customer information if the bank did not pay $197,000 before May 4, according to a statement – 4 – posted to […]

Continue reading...

Microsoft Detects New Malware Targeting Apple Computers


May 2, 2012 By
The Vigilant Application Owner

May 2, IDG News Service ­ (International) Microsoft detects new malware targeting Apple computers. Microsoft detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly 3 years ago. The malware is not widespread, a researcher from Microsoft’s Malware Protection Center said. However, the […]

Continue reading...