Tighter security coming in Firefox 4 – (Including silent updates?)

A new JavaScript engine, HTML5, tabs on top, and a new add-on framework are not the only improvements that users can expect in Firefox 4. At Black Hat on Wednesday, a trio of security representatives from Mozilla detailed how the company plans to push the browser to be more secure for users while nudging developers toward safer coding practices. One of the biggest fixes that’s been implemented in the Firefox 4 beta (Windows | Mac | Linux) repairs a hole that affects all browsers, a decade-old vulnerability that was mentioned in the documentation for CSS2. The exploit is a CSS … Continue reading Tighter security coming in Firefox 4 – (Including silent updates?)

Tool will test for phone bugs – Airprobe

A researcher released software at the Black Hat conference on Thursday designed to let people test whether their calls on mobile phones can be eavesdropped on. The public availability of the software, dubbed Airprobe, means that anyone with the right hardware can snoop on other peoples’ calls, unless the target telecommunications provider has deployed a patch that was standardized about two years ago by the GSMA, the trade association representing GSM (Global System for Mobile Communications) providers, including AT&T and T-Mobile in the United States. For more on this story, read Can your calls be intercepted? This tool can tell … Continue reading Tool will test for phone bugs – Airprobe

AirTight defends Wi-Fi WPA2 ‘vulnerability’ claim

A "publicity stunt?" Major threat? Or easily contained? Executives at AirTight are defending their description of a little-known "vulnerability" in the 802.11 standard in the face of criticism following their demonstration of a Wi-Fi exploit at the Black Hat security conference. One WLAN vendor called the claim a "publicity stunt." Others are saying the attack, which can only be mounted by an internal authorized WLAN user, is so limited in scope that it would be easier for an attacker to just use the unattended computer in a neighbor’s cubicle or even bribe a fellow employee to access data. "What those … Continue reading AirTight defends Wi-Fi WPA2 ‘vulnerability’ claim

Dell Tech Swipes Nude Photos of Gullible Customer

Dell is apparently eager to compete with Best Buy and Walmart for the title of most despised retailer in the country. A few months back, a tech support rep got in trouble for turning on a woman’s webcam without her permission. Then, last month, the company got nabbed knowingly shipping faulty PCs. And, just this week, the Texas-based manufacturer was caught shipping motherboards infected with malware. Now, a woman from California is alleging that a support technician for Dell stole nude photos of her from her PC and posted them online, and then charged $800 worth of computer gear to … Continue reading Dell Tech Swipes Nude Photos of Gullible Customer

Sites Feed Personal Details To New Tracking Industry

The largest U.S. websites are installing new and intrusive consumer-tracking technologies on the computers of people visiting their sites—in some cases, more than 100 tracking tools at a time—a Wall Street Journal investigation has found. The tracking files represent the leading edge of a lightly regulated, emerging industry of data-gatherers who are in effect establishing a new business model for the Internet: one based on intensive surveillance of people to sell data about, and predictions of, their interests and activities, in real time. The Journal’s study shows the extent to which Web users are in effect exchanging personal data for … Continue reading Sites Feed Personal Details To New Tracking Industry

Business ISP Star UK Finds Workers Use Office Internet for Personal Stuff

The latest independent survey of 1,000 workers from business ISP Star UK has found that 72% of British workers spend their lunch hour online and performing activities like shopping, banking, catching up with the latest sport or chatting to their friends on email or Facebook. The research was conducted after Star noticed that the network bandwidth usage for business Internet traffic in their data centres was consistently peaking between 12:00 – 14:00hrs, which is normally when British workers should be enjoying their lunch breaks. The most popular lunchtime habits for 63% of people are checking their personal email accounts, engaging … Continue reading Business ISP Star UK Finds Workers Use Office Internet for Personal Stuff

Farmville Will Get You in Trouble with IT Police

Farmville is arguably the biggest social game the world has seen. Well, maybe that’s a bit much, but it is a popular game. It so popular in fact, that many people will play it at work. However, doing so might get you into trouble with the IT police. According to a security report by Cisco, employees are breaking company policies by playing social networking games, and, by doing so, could be opening up networks to outside attacks. Cisco’s 2010 Midyear Report found that 7-percent of those who admitted to using Facebook at work also fessed up to spending an average … Continue reading Farmville Will Get You in Trouble with IT Police

Guard Dog Inc. Partners With Javacool Software LLC, Creators of Popular ‘SpywareBlaster’ Program

Guard Dog, Inc. today announces a significant advance in its mission to protect consumers with a truly complete level of security against threats of identity theft through a recent partnership with Javacool Software LLC (JCS). In keeping with the company’s commitment to provide the best protection and solutions against online identity theft threats JCS’s popular software, SpywareBlaster, will be provided to all Guard Dog members to help protect them online. “It has always been our primary objective to provide both current and future members of our identity theft protection service with the most comprehensive protection,” states Guard Dog Inc. Chief … Continue reading Guard Dog Inc. Partners With Javacool Software LLC, Creators of Popular ‘SpywareBlaster’ Program

FTC Issues Final Rule to Protect Consumers in Credit Card Debt

Amendments to Telemarketing Sales Rule Prohibiting Debt Relief Companies From Collecting Advance Fees Will Take Effect in October 2010 Starting on October 27, 2010, for-profit companies that sell debt relief services over the telephone may no longer charge a fee before they settle or reduce a customer’s credit card or other unsecured debt. “At the FTC we strive every day to make sure America’s middle class families get straight deals for their dollars,” Chairman Jon Leibowitz said. “This rule will stop companies who offer consumers false promises of reducing credit card debts by half or more in exchange for large, … Continue reading FTC Issues Final Rule to Protect Consumers in Credit Card Debt

FTC’s List of Corporate Privacy Abusers Shows Advertisers Can’t Be Trusted With Data Security

The FTC yesterday published a list of companies that used unfair, deceptive, false or misleading claims about consumer privacy that caused “substantial consumer injury,” and the names on it will surprise you. Sure, many of the companies are mortgage scammers and spam phishers. But lots of them are household and blue-chip brands such as Twitter, TJ Maxx (TJX), Microsoft (MSFT) and Dave & Busters. The list proves that advertisers cannot be trusted to regulate themselves when it comes to tracking and targeting consumers on the web or on mobile devices. There are currently few rules controlling how advertisers can use … Continue reading FTC’s List of Corporate Privacy Abusers Shows Advertisers Can’t Be Trusted With Data Security