TechBlog

12Seconds.com shutdown :-(

Published: October 22, 2010 Reading Time: 1 min

Last mail I got from 12Seconds.com: Dear 12ers, Tonight at 8:15PM PST we will shut down 12seconds.tv. No videos can be recorded after 5PM PST. If you have not yet downloaded your videos, go to 12seconds.tv and use the awesome 12seconds video export tool and save your memories. The tool will be available until 5:15 PM PST, so be sure to export your videos before then. Is this the last time you will hear from us? ...

Continue Reading

Facebook touts encryption as solution to security flaw

Published: October 22, 2010 Reading Time: 2 min

Facebook has proposed a solution to a recent security flaw that allowed apps to transmit personal data that involves encrypting the relevant string of numbers, according to a post on its Developer Blog on Thursday. The new set of parameters would allow developers to apply encryption within the next few weeks, preventing data that identifies application users from leaking to places it shouldn’t be. Facebook’s security flaw works something like this: when a Facebook user loads a particular kind of application (one that uses iframes) and authorizes the application to access their profile, the URL of the iframe then carries the user’s UID, a number that can link the account to actions on other websites. ...

Continue Reading

Panda: Mac is less secure than Windows, here's an antivirus

Published: October 22, 2010 Reading Time: 2 min

Follow up from: Panda security launches Panda Antivirus The number of Mac OS vulnerabilities has quintupled in less than a year. In 2009, 34 vulnerabilities were detected for Mac OS. So far in 2010, this number has risen to 175 vulnerabilities. Furthermore, the platform can also be affected by 170,000 macro viruses for Windows and there are 5,000 classified strains of malware that specifically target Apple systems, according to Panda Security. ...

Continue Reading

Google News Shows the Number of Shared Links

Published: October 22, 2010 Reading Time: 1 min

Google News continues to integrate with Twitter and other micro blogging services. After testing a section that shows newsworthy tweets from your subscription, Google started to add to the Google News Onebox the number of times a story has been shared. For example, Google’s Onebox shows that this article about Google TV has been shared by more than 50 Twitter users. Google links to the real-time results for this article, but the page only includes 10 results. ...

Continue Reading

Google Docs Adds Drag-and-Drop Image Upload

Published: October 22, 2010 Reading Time: 1 min

Google Docs adds a feature that’s already available in Gmail: you can now upload images using drag and drop. Open a new document and drag an image from your desktop or from a file manager. This feature only works in the latest versions of Firefox, Chrome and Safari because it requires HTML5’s File API. Unfortunately, you can’t upload multiple images and Google Docs doesn’t show a placeholder image or a progress bar. ...

Continue Reading

Creating stronger privacy controls inside Google

Published: October 22, 2010 Reading Time: 3 min

Google Official Blog: In May we announced that we had mistakenly collected unencrypted WiFi payload data (information sent over networks) using our Street View cars. We work hard at Google to earn your trust, and we’re acutely aware that we failed badly here. So we’ve spent the past several months looking at how to strengthen our internal privacy and security practices, as well as talking to external regulators globally about possible improvements to our policies. Here’s a summary of the changes we’re now making. ...

Continue Reading

Zynga sued in privacy breach controversy

Published: October 22, 2010 Reading Time: 2 min

218 million “class members” probably won’t settle for Farmville dollar A suit has been filed in U.S. District Court in San Francisco on behalf of a Minnesota woman charging game maker Zynga with leaking the personal information of 218 million Facebook members in violation of federal law. The suit seeks class action status. The action follows by three days an investigative story by The Wall Street Journal that found a large number of Facebook’s apps – including Zynga games such as Farmville and Mafia Wars – leaked the user IDs of Facebook players and their friends to outside companies. ...

Continue Reading

Defensive Computing

Published: October 22, 2010 Reading Time: 2 min

Windows is an attractive platform for the malware writers, in part, because of the sheer number of users. As Microsoft creep towards making their offerings more secure, applications are increasingly becoming the focus for vulnerability exploitation. Like Windows, Adobe products are a default software choice for most users. The bad guys know this and realize that its profitable to scrutinize their applications for exploitable vulnerabilities and create malware to take advantage of the fact. ...

Continue Reading

Electronic Car Lock Denial-of-Service Attack

Published: October 22, 2010 Reading Time: 1 min

Clever: Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles that have occurred without leaving any signs of forced entry. “We do get quite a lot of car crime in the borough where there’s no sign of a break-in and items have been taken from an owner’s car,” Inspector Haycock said. “It’s difficult to get in to a modern car without causing damage and we get a reasonable amount of people who do not report any. ...

Continue Reading

Use Windows 7 Event Viewer to track down issues that cause slower boot times

Published: October 22, 2010 Reading Time: 1 min

In this edition of the Windows Desktop Report, Greg Shultz shows you how to use some of the new features in Windows 7’s Event Viewer to investigate boot time and track down issues that can cause a slowdown in the boot process. This download is available as an entry in the TechRepublic Microsoft Windows Blog. Credit to ZDNet.

Continue Reading