Intel next-gen Haswell CPU line-up leaked, Core i7-4770K the flagship
VR-Zone has managed to get their hands on the line-up for Intel’s upcoming 22nm Haswell desktop processors, revealing that there will be initially 14 CPUs across the Core i7 and Core i5 brands. These processors will be utilizing a brand new CPU socket – LGA 1150 – on Lynx Point chipset motherboards, and are split […] more…In bringing Office to iOS, Microsoft is playing a dangerous game
It’s still not official, but the evidence that Microsoft is bringing Office to the iPad and iPhone is growing in abundance. At this point, it seems to be an inevitability that Redmond will release Office apps for iOS in some form in early 2013, with Android apps following soon after. Tags: Microsoft Office iOS more…Patch Tuesday – even Android and Windows RT get a look in
This month’s Patch Tuesday includes bulletins from both Microsoft and Adobe, and covers a range of platforms and products. There are updates in the mix for everything from Android to Windows RT, and from the Word Viewer to Exchange. more…ISO 27001 is the litmus test for information security
With increasing reliance on collaboration tools to improve information management in regulated industries — such as financial services, healthcare and construction — organizations must demand the highest levels of security from their external service providers in order to avoid data breaches and other incidents. Focusing on the physical data center that hosts the online collaboration […] more…Deploying DLP technology requires hands-on approach, experts say
About a year and a half ago, Mark Jackson, the information security officer at San Rafael, Calif.-based Westamerica Bank, began researching data loss prevention products for the regional community bank. His search began after a Department of Financial Institutions auditor recommended the technology as a way for Westamerica Bank to manage insider threats. Tags: Security more…Researchers warn of bulk WordPress and Joomla exploit tool serving fake antivirus malware to users
WordPress and Joomla exploits have existed for years, and cybercriminals have thus been exploiting them for a long time. Yet the situation may have gotten slightly more serious as of late, as there appears to be a bulk exploit tool being used in the wild, targeting sites running both popular content management systems, and having […] more…The fallacy of wireless power
They’re back — wireless chargers, that is. If you believe the hype in the product blogs and from some consulting firms, by 2016 you’ll have them nearly everywhere: hotel rooms, conference rooms, airports, lobbies, cafés, and on your desks and entryway tables. I’m not so sure. Despite years of vendor attempts, the fairly old technology […] more…Cached Windows passwords sound risky — but aren’t
I deal with a lot of customers who area worried about Windows password attacks. These days, the biggest fear is of pass-the-hash attacks, a topic I’ve written about many times in the past couple of years. Often, when customers voice concern about pass-the-hash attacks, they ask me about cached log-ons in Windows. They’ve heard about […] more…Garage door opener using Siri and Raspberry Pi
[DarkTherapy] wrote in to tell us about his garage door opener that works with Siri and a Raspberry Pi. It’s pretty hard to find a picture that tells the story of the hack, but here you can see the PCB inside the housing of the garage door opener. He patched the grey wires into the […] more…Best Gaming CPUs For The Money: December 2012
This month we discuss two new CPUs, Intel’s Core i7-3970X and AMD’s Athlon II X4 651K, neither of which gamers are going to get particularly excited about. We also discuss the disappearance of the Pentium G2120, along with a handful of price changes. If you don’t have the time to research benchmarks, or if you […] more…Malicious QR codes pop up on traffic-heavy locations
Cybercrooks are putting up stickers featuring URLs embedded in Quick Response codes (QR codes) as a trick designed to drive traffic to dodgy sites. QR codes are two-dimensional matrix barcode that can be scanned by smartphones that link users directly to a website without having to type in its address. By using QR codes (rather […] more…Engineer Shows How To Pirate Windows 8 Metro Apps, Bypass In-app Purchases
This article is a follow-up to my previous 2011 article on Reverse Engineering and Modifying Windows 8 apps. In this article we’ll see how to use innate Windows 8 security attack vectors in such a way that could compromise Windows 8 games revenue stream. We’ll review real-world examples for all Win8 programming languages and frameworks. […] more…Five Critical Bulletins, Two Important for December 2012 Patch Tuesday
Before the year ends, Microsoft releases seven bulletins, five of which are rated as critical. Overall, these bulletins address 11 vulnerabilities. The Critical bulletins resolve vulnerabilities found in Microsoft Windows, Word, Internet Explorer and Windows Server. The remaining two vulnerabilities are focused on issues in Microsoft Windows. If successfully exploited, those bulletins deemed critical may […] more…WordPress 3.5 Released
Update like it’s hot! Today marks the release of WordPress 3.5 (Named Elvin after jazz drimmer Elvin Jones), a major release this year for the WordPress project. This release highlights some very significant changes to anything from the JavaScript libraries being used, to a brand new Media Manager. Although there are no security fixes highlighted, […] more…December 2012 Microsoft Security Bulletins – IE, MSWord, Font Parsing, and More
The folks at the Microsoft Security Response Center are winding down 2012 with another full release of seven Security Bulletins containing fixes for memory corruption on application, server, and system code along with a Certificate Bypass problem and set of fixes for Oracle Outside In software components. Within the seven Bulletins, they are patching at […] more…But did she STEAL the iPhone? App takes photo of woman trying to unlock it
A woman who tried to unlock a stolen iPhone unwittingly took her own photo. An application on the phone then automatically sent the photo to the owner, who called the police. It’s a good reminder that there are tools out there, either free or darn close to it, that can track your stolen or lost […] more…More information
- Huawei security chief: We can help keep U.S. safe from ‘Net threats
- Resolved: PAWS/Workflow Outage
- What I Learned at Gerrymandering Summer Camp
- DHS Mulls Designating US Election System As Critical Infrastructure
- A virus on a *Mac*? Is NOTHING sacred? [Chet Chat Podcast 211]
- Google Launches Alert Center for G Suite
- Microsoft’s strategy on identity management aimed squarely at cloud-based services
- CISA Warns of Exploited Broadcom, Commvault Vulnerabilities
- Microsoft Office CVE-2016-7233 Information Disclosure Vulnerability
- Facebook is being sued for intercepting users’ communications