| 

Panda: Mac is less secure than Windows, here's an antivirus

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 2 min
  • Word Count: 307 words

Follow up from: Panda security launches Panda Antivirus The number of Mac OS vulnerabilities has quintupled in less than a year. In 2009, 34 vulnerabilities were detected for Mac OS. So far in 2010, this number has risen to 175 vulnerabilities. Furthermore, the platform can also be affected by 170,000 macro viruses for Windows and there are 5,000 classified strains of malware that specifically target Apple systems, according to Panda Security. ...

Continue Reading Panda: Mac is less secure than Windows, here's an antivirus

Google News Shows the Number of Shared Links

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 1 min
  • Word Count: 82 words

Google News continues to integrate with Twitter and other micro blogging services. After testing a section that shows newsworthy tweets from your subscription, Google started to add to the Google News Onebox the number of times a story has been shared. For example, Google’s Onebox shows that this article about Google TV has been shared by more than 50 Twitter users. Google links to the real-time results for this article, but the page only includes 10 results. ...

Continue Reading Google News Shows the Number of Shared Links

Google Docs Adds Drag-and-Drop Image Upload

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 1 min
  • Word Count: 158 words

Google Docs adds a feature that’s already available in Gmail: you can now upload images using drag and drop. Open a new document and drag an image from your desktop or from a file manager. This feature only works in the latest versions of Firefox, Chrome and Safari because it requires HTML5’s File API. Unfortunately, you can’t upload multiple images and Google Docs doesn’t show a placeholder image or a progress bar. ...

Continue Reading Google Docs Adds Drag-and-Drop Image Upload

Creating stronger privacy controls inside Google

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 3 min
  • Word Count: 592 words

Google Official Blog: In May we announced that we had mistakenly collected unencrypted WiFi payload data (information sent over networks) using our Street View cars. We work hard at Google to earn your trust, and we’re acutely aware that we failed badly here. So we’ve spent the past several months looking at how to strengthen our internal privacy and security practices, as well as talking to external regulators globally about possible improvements to our policies. Here’s a summary of the changes we’re now making. ...

Continue Reading Creating stronger privacy controls inside Google

Zynga sued in privacy breach controversy

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 2 min
  • Word Count: 394 words

218 million “class members” probably won’t settle for Farmville dollar A suit has been filed in U.S. District Court in San Francisco on behalf of a Minnesota woman charging game maker Zynga with leaking the personal information of 218 million Facebook members in violation of federal law. The suit seeks class action status. The action follows by three days an investigative story by The Wall Street Journal that found a large number of Facebook’s apps – including Zynga games such as Farmville and Mafia Wars – leaked the user IDs of Facebook players and their friends to outside companies. ...

Continue Reading Zynga sued in privacy breach controversy

Defensive Computing

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 2 min
  • Word Count: 380 words

Windows is an attractive platform for the malware writers, in part, because of the sheer number of users. As Microsoft creep towards making their offerings more secure, applications are increasingly becoming the focus for vulnerability exploitation. Like Windows, Adobe products are a default software choice for most users. The bad guys know this and realize that its profitable to scrutinize their applications for exploitable vulnerabilities and create malware to take advantage of the fact. ...

Continue Reading Defensive Computing

Electronic Car Lock Denial-of-Service Attack

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 1 min
  • Word Count: 195 words

Clever: Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles that have occurred without leaving any signs of forced entry. “We do get quite a lot of car crime in the borough where there’s no sign of a break-in and items have been taken from an owner’s car,” Inspector Haycock said. “It’s difficult to get in to a modern car without causing damage and we get a reasonable amount of people who do not report any. ...

Continue Reading Electronic Car Lock Denial-of-Service Attack

Use Windows 7 Event Viewer to track down issues that cause slower boot times

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 1 min
  • Word Count: 58 words

In this edition of the Windows Desktop Report, Greg Shultz shows you how to use some of the new features in Windows 7’s Event Viewer to investigate boot time and track down issues that can cause a slowdown in the boot process. This download is available as an entry in the TechRepublic Microsoft Windows Blog. Credit to ZDNet.

Continue Reading Use Windows 7 Event Viewer to track down issues that cause slower boot times

Chromeless: Build your own Browser UI using HTML, CSS and JS

  • Post author: Omid Farhang
  • Post published: October 22, 2010
  • Reading Time: 4 min
  • Word Count: 663 words

Mozilla Labs: The “Chromeless” project experiments with the idea of removing the current browser user interface and replacing it with a flexible platform which allows for the creation of new browser UI using standard Web technologies such as HTML, CSS and JavaScript. Introduction Have you ever had an idea to improve the user interface of your browser? Have you ever actually gone and tried to make that idea a reality? If you have, you would have probably used technologies like XUL and XPCOM. Much of the user interface (browser chrome) of Firefox is implemented in XUL, which uses a lot of Web-based technologies such as the DOM and JavaScript. Firefox is put together in a way that seasoned developers are able implement features with amazing efficiency, but at the same time, the browser interface in XUL represents a barrier for potential contributors. What if the parts of the browser that are most interesting to contributors were implemented in standard Web technologies such as HTML, CSS and JavaScript? What kinds of wild-eyed experimentation would we see if a new conception of browser UI could be prototyped in about the same time it takes to write a web page? ...

Continue Reading Chromeless: Build your own Browser UI using HTML, CSS and JS

PCWorld links to scareware

  • Post author: Omid Farhang
  • Post published: October 21, 2010
  • Reading Time: 2 min
  • Word Count: 236 words

I was reading an article on PCWorld’s website about the upcoming Google Chrome OS: So far so good. Except that I inadvertently clicked on one of their sponsored links: which ironically states “Here is all about spyware removal and even more.” After a few redirects, my browser is hijacked by one of those FakeAV scanners: Here is the HTTP traffic capture screenshot and log: ...

Continue Reading PCWorld links to scareware