Profile of Sharon Gaudin
News & Commentary Posts: 737
Articles by Sharon Gaudin
posted in February 2007
2/28/2007
A new proof-of-concept code is circulating for a Firefox vulnerability that was fixed in Mozilla's security update that was released last week.
2/28/2007
The man allegedly used false identities and private mailboxes in at least 39 states to commit at least 700 instances of fraud against Cisco.
2/28/2007
As worldwide worm epidemics fade, Trojan attacks aimed at specific companies will take their place as the predominant malware menace this year.
2/28/2007
A variant of the Storm worm is able to analyze network traffic and insert a link to a malicious Web site into text posted in blogs, Webmail, and bulletin boards.
2/28/2007
The flaw in Sun Solaris' Telnet framework lets hackers try to log into computer systems as the user or administrator, executing commands remotely.
2/27/2007
Symantec and RealNetworks corporate press releases were among those accessed by Blue Bottle before they were made public and used to make insider trades, the agency claims.
2/27/2007
The privilege escalation bug enables regular users to elevate their status to system-level access.
2/27/2007
Two New York men wrote programs that would exploit a flaw in the social networking Web site and enable them to gather personal information on MySpace users.
2/27/2007
After a year-and-a-half-long legal battle, Verizon Wireless wins a permanent injunction against Specialized Programming and Marketing and its owner.
2/26/2007
Austin, Texas, police are investigating after security cameras captured video of the thief carrying out a laptop and a projector from a Seton Family of Hospitals office.
2/23/2007
The patches foil the location.hostname vulnerability and help computer users running Firefox 1.5.0.10 and Firefox 2.0.0.2.
2/23/2007
2/23/2007
A remotely exploitable vulnerability that exists within Office's Publisher 2007 allows a hacker to remotely execute arbitrary code as a logged-in user, security firm eEye says.
2/23/2007
A so-called hacktivist's Trojan program that allowed him to infiltrate the judge's computer and find evidence of child pornography possession raises legal and ethical questions for some.
2/23/2007
Richard C. Honour faces a maximum of five years in prison and a fine of $250,000 for writing and distributing the Trojan horse.
2/22/2007
The attack, which lasted two and a half days before it was shut down, was described as a sophisticated, multi-pronged operation.
2/22/2007
A flood of spam coming out of China and South Korea is fueling a 30% jump in spam levels in just the past week, according to a new report.
2/22/2007
Mozilla has pushed back its next security update for Firefox so it will include a fix for a vulnerability that allows malicious Web sites to manipulate authentication cookies.
2/22/2007
Websense warns that phishers are targeting online poker players who use the Party Poker site.
2/22/2007
Out of an annual IT security budget of $5.6 billion, the U.S. is spending $140 million to $150 million annually on security awareness and training.
2/21/2007
Users -- both home and commercial -- need to change the default user name and password on their routers.
2/21/2007
Google is pushing out a fix to users through its auto updating system, but security pros recommend users manually update their systems.
2/21/2007
The purported leader of an organized criminal group known as DrinkOrDie faces 10 years in prison and a $500,000 fine related to charges of copyright infringement.
2/20/2007
A link in the e-mail about Australia's John Howard infects the unsuspecting with malware that tracks Web access and pinpoints a PC's whereabouts on Google Maps.
2/20/2007
A new amendment to the Sexual Offenses Act in the United Kingdom could land people on the register for sending e-mails of a "sexual nature."
2/20/2007
Forensic experts analyzed used hard drives and found porn, driver's license numbers, medical information, and even one man's last will and testament.
2/20/2007
The Nationwide Building Society was fined in connection with the theft of a laptop from an employee's home last year.
2/16/2007
A new study shows that our desks are loaded with germs. And women's offices have nearly three times more germs than their male colleagues'.
2/16/2007
Turkish police arrested 17 gang members who allegedly worked with three Russian hackers to break into and raid online bank accounts.
2/16/2007
The vulnerabilities were identified by the Month of Apple Bugs project.
2/15/2007
The Palm OS Treos have a flaw in the feature that allows users to access data, so information can be called up even when the smart phones are locked down with a password.
2/15/2007
Hackers used the vulnerability, which was confirmed Wednesday, to launch an attack against two employees at the same company earlier this month.
2/15/2007
One propped open door to a smoking area can be a huge security risk for a company otherwise focused on battening down the network hatches.
2/14/2007
Subject lines used in the attack are many and varied, but all pose as a romantic message, according to Sophos.
2/14/2007
Study shows identity fraud is worse for people living in certain areas, like New York, Arizona, and California. But don't feel too safe if you live in a rural area, either.
2/14/2007
The agency is warning people of a spoofing scam that is using the Better Business Bureau name and a false e-mail address to lure users to click on links and connect with malicious Web sites.
2/13/2007
Cisco Systems announced on Tuesday that there are several vulnerabilities in the Intrusion Prevention System feature set of its Cisco IOS.
2/13/2007
The worm converted icons of infected programs into images of a panda burning joss sticks, while it stole user names and passwords from gamers.
2/13/2007
In terms of urgency, one vendor says this patch release scores seven or eight on a scale of one to 10.
2/13/2007
A new study shows that majority of sites have medium- to high-level vulnerabilities, and more than 90% have some kind of vulnerability.
2/13/2007
The Department of Veterans Affairs issues an update on its investigation into the January loss of a hard drive. The employee who lost it is on administrative leave.
2/12/2007
Sun Microsystems is preparing to issue an alert to users on the vulnerability the SANS Institute called a "major zero-day bug."
2/12/2007
Some of the recently lost or stolen computers contained 'sensitive' information, but the extent of the damage from the losses is unknown.
2/12/2007
Spammers and virus writers are upping their efforts this month to lure in victims with sweet-sounding messages, security companies warn.
2/12/2007
The new technology focuses on analyzing packet rate and frequency of connections, rather than signature or pattern identification.
2/12/2007
Denial-of-service attack almost takes down 13 root servers, but increased capacity, fortified security save the day.
2/12/2007
SANS analysts are warning IT managers to stop using Telnet altogether because of a problem in the way Solaris 10 and 11 are set up to use Telnet.
2/9/2007
The security breach hit the Canadian Nuclear Safety Commission Wednesday afternoon. No critical information was reportedly affected.
2/9/2007
An outside contractor lost nine backup tapes that held sensitive personal information on 52,000 workers and 83,000 employees. The data is thought to have been destroyed.
2/9/2007
The Massachusetts attorney general is leading a probe into the security measures parent company TJX took to protect its consumer-related information from data leaks and hacker attacks.
2/9/2007
The cyberthreat analysis company is paying $8,000 for each submitted vulnerability that allows an attacker to remotely exploit and execute arbitrary code on either Vista or IE7.
2/8/2007
The company reports that a fix for the flaw went out to users in automatic updates earlier this week. The flaw was in the Scan Engine, which is used in many of Trend Micro's products
2/8/2007
At least four of the pending updates are being called critical.
2/8/2007
The company wants to expand the capacity of the global Internet infrastructure by 10 times within three years, enabling it to handle 4 trillion queries a day.
2/8/2007
Security professionals are sounding an alarm: A rush to download free music following the Grammy show will open company networks to security threats.
2/8/2007
While 66% of IT and business managers surveyed have "some type" of encryption strategy, only 16% have enterprise-wide strategies, the Ponemon Institute found.
2/8/2007
Sophos Mobile Security is designed to protect PDAs and smartphones running Microsoft Windows Mobile from viruses and spyware.
2/7/2007
Security experts say possibly millions of zombie computers were used in Tuesday's attack on the Internet's 13 root servers. But the attack didn't work because people had been planning for it for years.
2/7/2007
Under the program, Microsoft will pay as much as 20% of the gross revenue, depending on the kind of game developed.
2/7/2007
After accounting for 22% of spam messages in the first half of 2006, pornographic spam dropped down to just 4% in January.
2/7/2007
A majority of those with wireless devices fail to make them secure while attending the security conference, says AirDefense.
2/6/2007
The denial-of-service attack hit Tuesday and nearly took down three of the 13 root servers that help manage worldwide Internet traffic.
2/6/2007
Symantec's IT Risk Management Report shows that 60% of IT managers expect a disruptive security event every year.
2/6/2007
A majority of consumers in the United States and the United Kingdom say physical security checks can reduce identity fraud and better secure airports and border crossings, one study suggests.
2/6/2007
And in an ironic twist for a government agency focused on monitoring diseases and warning the public about them, this time the agency may have spread the virus itself.
2/6/2007
Worried your own employees might be accidentally or maliciously sending out confidential information? Websense says it has software to tackle that problem.
2/5/2007
P.A. Semi debuts samples of a 64-bit, dual-core chip that the company claims is 300% to 400% more power efficient than competing processors.
2/5/2007
HP is buying Bristol Technology, which makes software to monitor complex business transactions within an organization, such as insurance claim processes, product orders, and inventory management.
2/5/2007
Douglas Grose is stepping into the role of AMD's senior VP of technology development, manufacturing, and supply chain.
2/5/2007
The Semiconductor Industry Association predicts that global semiconductor sales will jump by 10% to hit $273.8 billion this year.
2/2/2007
Taking its common stock listing off the Nasdaq reduces its listing fees and administrative burdens.
2/2/2007
Dell's founder returns to the CEO office with optimism but a long to-do list
2/2/2007
The chip is designed to extend the battery life of mobile devices while making it easier to see the display.
2/2/2007
The PC maker has a new sponsorship agreement with the AT&T Williams team and will supply the technology for the racing team.
2/2/2007
Investors allege Dell's relationship with Intel contributed to financial mismanagement that artificially inflated the computer maker's stock price.
2/1/2007
Dell has been stumbling as Hewlett-Packard surges ahead. Can Michael Dell right this listing ship?