| 

Firefox 17 to make add-ons more secure

  • Post author: Omid Farhang
  • Post published: August 23, 2012
  • Reading Time: 2 min
  • Word Count: 305 words

h-Online: As suggested by some of its developers back in 2010, the Firefox browser will introduce enhanced separation between add-ons and the rest of the browser. With the change, which is planned to take effect with the release of Firefox 17, scripts on web pages will only be able to access the data belonging to add-ons if they are included in a whitelist. The beta version of Firefox 15 already logs warning messages in the browserā€™s Error Console when a page that is not on the whitelist tries to access data from add-ons. This behavior has been included to make add-on developers aware of the new policy and to give them time to fix their add-onā€™s behavior before the release of Firefox 17. ...

Continue Reading Firefox 17 to make add-ons more secure

AMD Blog Hacked, Database leaked on Internet

  • Post author: Omid Farhang
  • Post published: August 20, 2012
  • Reading Time: 1 min
  • Word Count: 136 words

TheHackerNews: A team of Hackers called, ā€œr00tBeer Security Teamā€ today hack into official blog of Advanced Micro Devices (AMD) which is a American multinational semiconductor company. AMD is the second-largest global supplier of microprocessors based on the x86 architecture and also one of the largest suppliers of graphics processing units. Hacker deface the blog page (http://blogs.amd.com/wp-content/r00tbeer.html) [Dead Link ā€“ Screenshot blow] and also leak the complete user database of blog on his twitter account. Leaked database SQL file uploaded on Mediafire by Hackers which include 200 AMD userā€™s Emails, WordPress Blog Usernames and Passwords. ...

Continue Reading AMD Blog Hacked, Database leaked on Internet

Not so secure: Text messaging on iPhone can be hacked

  • Post author: Omid Farhang
  • Post published: August 19, 2012
  • Reading Time: 2 min
  • Word Count: 238 words

FirstPost: A hacker Friday revealed a security flaw that he claimed could make Appleā€™s iPhone particularly vulnerable to text message cheating. The flaw has existed since iPhone was first launched in 2007, and is still not solved in the beta version of iOS 6, the next operating system for iPhone, the hacker under the name ā€œPod2gā€ said in a blog post, reported Xinhua. ...

Continue Reading Not so secure: Text messaging on iPhone can be hacked

Bogus anti-hacking tool targets Syrian activists

  • Post author: Omid Farhang
  • Post published: August 19, 2012
  • Reading Time: 1 min
  • Word Count: 179 words

h-online: Syrian activists, journalists and opposition group members are reportedly under attack by malware claiming to be a security tool that will help protect them against hackers. The fake ā€œAntiHackerā€ tool is being spread through targeted phishing emails and via sites such as Facebook, and claims to provide ā€œAuto-Protect & Auto-Detect & Security & Quick scan and analyzingā€ functionality. ...

Continue Reading Bogus anti-hacking tool targets Syrian activists

PostgreSQL patches XML flaws

  • Post author: Omid Farhang
  • Post published: August 19, 2012
  • Reading Time: 2 min
  • Word Count: 333 words

h-online: A flaw in the built-in XML functionality of PostgreSQL (CVE-2012-3488) and another in its optional XSLT handling (CVE-2012-3489) have been patched, and the developers have released updated versions of the open source database with relevant fixes. The holes being patched are related to insecure use of the widely used libxml2 and libxslt open source libraries and the PostgreSQL developers advise anyone using those libraries to check their systems for similar problems. ...

Continue Reading PostgreSQL patches XML flaws

IE 9.0.9 Available via Windows Update

  • Post author: Omid Farhang
  • Post published: August 16, 2012
  • Reading Time: 1 min
  • Word Count: 213 words

MSDN: The August 2012 Cumulative Security Update for Internet Explorer is now available via Windows Update. This security update resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows clients and Moderate for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows servers For more information, see the full bulletin. ...

Continue Reading IE 9.0.9 Available via Windows Update

Google's New Favicon

  • Post author: Omid Farhang
  • Post published: August 16, 2012
  • Reading Time: 1 min
  • Word Count: 164 words

Google Operation System Blog: Google has a new favicon that looks like the icon from Googleā€™s mobile search apps for Android and iOS. The same icon was also used for the Google Search app from the Chrome Web Store. Most likely, Google wanted to use the same icon irrespective of the platform so that it becomes instantly recognizable. Hereā€™s the new favicon: ā€¦ and the old favicon, which was launched back in 2009: ...

Continue Reading Google's New Favicon

Adult Phishing Scams Haunt Aura Kasih

  • Post author: Omid Farhang
  • Post published: August 4, 2012
  • Reading Time: 2 min
  • Word Count: 308 words

Symantec: Phishers continue to target Indonesian celebrities with adult scams. Phishing attacks on rock star Ahmad Dhani have already been seen. In July 2012, Symantec observed a phishing site that claimed to have an adult video of Indonesian actress and singer Aura Kasih. The phishing site spoofed a social networking brand and was hosted on a free Web hosting site. The adult scam came in light of a recent scandal surrounding the singer. An adult video, allegedly of Aura Kasih and pop star Nazril Irham, has been circulating recently in Indonesia over the internet and mobile phones. It is rumored that the video started appearing after Nazril Irhamā€™s laptop was stolen. ...

Continue Reading Adult Phishing Scams Haunt Aura Kasih

Final version of Windows 8 leaked online, No Windows Media Player yet

  • Post author: Omid Farhang
  • Post published: August 3, 2012
  • Reading Time: 1 min
  • Word Count: 210 words

Ubergizmo: Good news for those looking to get their hands on Windows 8 before everyone else does, the final build of Windows 8 has just been leaked online. This news comes a day after it was announced that the final version of Windows 8 had been finished. MSDN and TechNet customers wonā€™t be able to download their version of Windows 8 until August 15th, an enterprise version of Windows 8 is currently making rounds at different file sharing websites across the web. ...

Continue Reading Final version of Windows 8 leaked online, No Windows Media Player yet

Google Wallet now accepts multiple cards

  • Post author: Omid Farhang
  • Post published: August 3, 2012
  • Reading Time: 1 min
  • Word Count: 119 words

NEW YORK (CNNMoney) ā€” Google just took your phone a step closer to replacing your wallet in the mobile payment revolution. The company expanded its mobile payments platform, Google Wallet, to accept multiple credit cards. Users can now connect their Visa , MasterCard, American Express, or Discover cards with the new version of Google Wallet. Itā€™s an update from the companyā€™s previous partnership with MasterCard, Citigroup and Sprint. ...

Continue Reading Google Wallet now accepts multiple cards