A surge in high-profile hacker attacks this year is demonstrating the limits of an older generation of security software from Symantec Corp. (SYMC) and McAfee Inc., putting pressure on them to revamp their product lines.
Tags:
hacker-attacks,
limits,
Security
Harper following too close to Republicans Abbotsford Times Thanks to a Wikileak release we now know that PM Stephen Harper has been in secret discussions with US officials to, among other things, open up our labour market to the Americans. It doesn't stop there either, as his goal is to sell us out as a ..
Tags:
following-too,
stephen-harper,
table-border,
wikileak
Defending the Majority, Not Punishing the Poorest Conference Venezuelanalysis.com He said Wikileaks has revealed that the Archbishop of Caracas, Baltazar Porras, held secret meetings with the US Ambassador in Caracas to call for US intervention in Venezuela to contain Venezuela's “regional aspirations”. Another Wikileak showed …
Tags:
baltazar-porras,
venezuela,
wikileak
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user’s system.
Tags:
Apple,
exploit,
multiple,
secunia-security,
Security
strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface.
Tags:
adds-additional,
strongswan,
trusted-network
Anonymous and LulzSec have wreaked havoc against government and business websites and servers, from low-level defacement of websites up to more sophisticated actions such as stealing sensitive data.
Tags:
defacement,
from-low-level,
lulz,
such-as-stealing
IDG News Service – Hacker groups such as Anonymous and Lulz Security may need to be monitored more closely in the event they are assisted by other hackers with higher skill levels and decide to strike critical infrastructure.
Tags:
lulz,
monitored-more,
other-hackers,
Security,
strike-critical
http://sch13.pre2.go.th defaced by Ashiyane Digital Security Team
Tags:
ashiyane,
ashiyane-digital,
Security
http://ucl.ubon.go.th defaced by 3n_byt3
http://e-office.pkn2.go.th defaced by Ashiyane Digital Security Team
Tags:
ashiyane,
ashiyane-digital,
security-team