Monthly Archives: June 2012

Criminals Bypassing Sophisticated Device Fingerprinting With Basic Tools


June 7, 2012 By
The Vigilant Application Owner

SecurityWeek – (International) Criminals bypassing sophisticated device fingerprinting with basic tools. Research from Trusteer shows device fingerprinting, – 14 – which is used in fraud detection systems, might be a useless layer of protection after they discovered a manual for bypassing such features being circulated among online criminals. In it, the author explains how to […]

Continue reading...

SeaMonkey 2.10 Released, Closes Security Holes


By
The Vigilant Application Owner

H Security – (International) SeaMonkey 2.10 released, closes security holes. Mozilla’s SeaMonkey Project announced the release of version 2.10 of its open source “all-in-one Internet application suite.” The new version of SeaMonkey closes seven security holes, four of which are rated as critical. These include a buffer overflow and use-after-free issues, as well as a […]

Continue reading...

Hackers Crack More Than 60% Of Breached LinkedIn Passwords


By
The Vigilant Application Owner

Computerworld – (International) Hackers crack more than 60% of breached LinkedIn passwords. More than 60 percent of the unique hashed passwords accessed by hackers from a LinkedIn password database and posted online the week of June 4 were already cracked, according to security firm Sophos. It is very likely the remaining passwords were also cracked, […]

Continue reading...

LinkedIn Confirms ‘Some’ Passwords Leaked


June 6, 2012 By
The Vigilant Application Owner

Computerworld – (International) LinkedIn confirms ‘some’ passwords leaked. In response to widespread reports of a massive data breach at LinkedIn, the company confirmed June 6 that passwords belonging to “some” members were compromised. In a blog post, LinkedIn’s director said the company confirmed an unspecified number of hashed passwords posted publicly on a Russian hacker […]

Continue reading...

Nexus Professional 2.0.5 Released: It’s Easier to Evaluate Awesomeness


By
Tim O'Brien

Nexus Pro has enhanced search capabilities that make it easy to identify which components are popular versus which components you might want to avoid. With Nexus Pro you can track your exposure to security vulnerabilities and licensing issues. With Nexus Pro you gain control over your releases so you can place release candidate binaries in […]

Continue reading...

PostgreSQL Security Updates Released


June 5, 2012 By
The Vigilant Application Owner

H Security – (International) PostgreSQL security updates released. The PostgreSQL Global Development Group released security updates for all currently supported versions, (9.1.x, 9.0.x, 8.4.x, and 8.3.x) of the open source relational database system. The updates include versions 9.1.4, 9.0.8, 8.4.12, and 8.3.19 of PostgreSQL, which close 2 security holes and include 42 other bug fixes. […]

Continue reading...

Researchers Find Methods For Bypassing Google’s Bouncer Android Security


June 4, 2012 By
The Vigilant Application Owner

Threatpost – (International) Researchers find methods for bypassing Google’s Bouncer Android security. Google’s Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company introduced the Bouncer system to look for malicious apps in the Google Play market earlier in 2012. Bouncer, which checks for malicious apps […]

Continue reading...

‘Flame’ Spread Via Rogue Microsoft Security Certificates


By
The Vigilant Application Owner

PCWorld – (International) ‘Flame’ spread via rogue Microsoft security certificates. Analysis of the “Flame” code revealed rogue Microsoft security certificates were used to make the malware appear as if it was officially signed by Microsoft. Microsoft issued a security advisory June 3, revoked trust in the rogue certificates, and provided steps to help IT admins […]

Continue reading...