In this First Look video, we look at the new interface, the new features, and the new limitations of the latest free antivirus to enter the market. Should AVG and Avira be scared? Watch and find out.
The content-filtering software the Chinese government wants installed on all PCs sold in that country beginning next week was poorly developed and puts users at risk of having their computers compromised, a security expert who examined the code said on Thursday.
The Chinese government is requiring that all PCs include the Green Dam-Youth Escort software to block pornography, but it also blocks access to content related to violent computer games, illegal drugs and political speech, said Ben Feinstein, director of research at SecureWorks, a managed security service provider.
Critics are worried that the Chinese government could use Green Dam, a … Read more
Updated October 30 at 9:58 a.m. PDT: The software was called SecureTwitter when this article was first published. The name was later changed to SecureTweets and the article has been updated to reflect that.
Finally, there's a tool that can help prevent people from clicking on URLs that appear to come from friends on Twitter and other social media sites but which lead to sites hosting malware.
The U.K. government plans to form a cybersecurity agency, with functions including cyberattack capability.
The Office of Cyber Security (OCS), dedicated to protecting Britain's IT infrastructure, will be created with a model proposed--and in part practiced by--the U.S. The U.K. government said Thursday that the OCS will have charge of a cross-government program, while a multi-agency Cyber Security Operations Centre (CSOC) will coordinate the protection of critical IT systems.
The OCS will also act as a conduit for information security collaboration between government and industry experts. Robert Hannigan, the prime minister's security adviser, said the … Read more
An exploit for a flaw in censorware mandated by the Chinese government has been made publicly available for download on the Internet.
The buffer overflow flaw exists in the latest, patched version of Green Dam, 3.17, according to security researcher "Trancer," who claims authorship of the attack code.
"I wrote a Metasploit exploit module for Internet Explorer, which exploits this stack-based, buffer overflow vulnerability in Green Dam 3.17," Trancer wrote in his Recognize-Security blog. "I've tested this exploit successfully on the following platforms: IE6, Windows XP SP2, IE7, Windows XP SP3, Windows … Read more
Updated June 25 at 9:00 a.m. PDT with Trend Micro saying the Trojan is harmful to Macs and PCs.
Venture capitalist Guy Kawasaki got more than he bargained for from an automated feed he set up on his Twitter account.
Some of Kawasaki's more than 139,000 Twitter followers noticed something strange when they saw a particular non-VC-related tweet sent from his account on Tuesday.
The update advertised a sexy video of "Gossip Girl" star Leighton Meester and had a link leading to a site where, if the visitor clicked to view the video (and … Read more
Well, that didn't take long.
A day after making available a free beta of its Microsoft Security Essentials software, Microsoft has stopped offering new downloads, saying it has reached the number of participants it was looking for, at least here in the U.S. The software maker had said it was only looking to initially have about 75,000 downloads of the product, formerly code-named Morro.
When Adrian Lamo first started compromising Web sites and alerting the owners to the security holes, he was thanked, until he struck the likes of The New York Times and Microsoft.
He spent six months on home detention and studied journalism before becoming a threat analyst.
Motivated by the process of hacking and delighted by the unexpected opportunities that could arise, Lamo spent time doing things like responding to customer help desk requests he discovered languishing in the networks he broke into.
In the third of a three-part Q&A series with hackers, Lamo, now 28, talks about his &… Read more
Updated June 25 at 12:50 p.m. PDT: Several commenters pointed out a secondary scanning process that runs while a scan is running. While Microsoft Security Essentials uses little memory when not scanning, during a second round of tests it used 60MB to 70MB of RAM, while consuming around 200MB of Virtual Memory.
Updated June 24 at 11:30 a.m. PDT: The 75,000 available slots for testing Security Essentials have been taken. There is no word at the moment whether Microsoft will allow more testers to download the public beta in the future.
Microsoft on Tuesday released … Read more
Mark Abene first started using computers when he was about 9 years old, and by 12 he was exploring the electronic frontier from his home in Queens, New York. On bulletin board systems he swapped information with other phone phreakers and hackers, who formed the "Masters of Deception" group and inspired a book.
Abene, whose handle was "Phiber Optik," later received a one-year prison sentence for computer-related activities committed when he was a minor from a judge who said he wanted to send a message.
Featured in numerous newspaper and magazine articles, radio shows, and in … Read more