I like to keep an eye on what is happening on my Mac and a utility that I have used for a long time is MenuMeters. This is a menu bar utility that shows processor usage, disk usage, upload and download speed, and free and used memory. This utility makes it easy to spot problems that might otherwise be missed and it highlighted an issue with ksfetch. So what is it and how do you stop it? Continue reading
If you’ve ever downloaded Chrome, even for just a trial (guilty!), you might not be aware that Google have slipped a little bit of hidden software into your Library.
This software is called Google Updater, and it secretly “calls home” on a regular basis and downloads updates to your Google software without either asking before, or notifying you after, doing so. In Developer circles, this is considered very shady practice. Users should be asked for consent and informed when software makes changes to either itself or the user’s computer, and ideally those notifications should tell the user what has been changed and how the changes could impact them. Continue reading
Wow, looks like Skype really messed-up with this one, but they responded really quickly to fix it… only 2 months after it went public! You can read more at this link…
http://www.reddit.com/r/netsec/comments/13664q/skype_vulnerability_allowing_hijacking_of_any/ Continue reading
According to various reports, in the past few days a number of websites created using WordPress have been hacked. While the attack initially appeared to be limited to web sites hosted by American ISP DreamHost, it has since become apparent that blogs hosted at GoDaddy, Bluehost and Media Temple have also been affected. Unconfirmed reports by WPSecurityLock suggest that other PHP-based management systems, such as the Zen Cart eCommerce solution, have also been targeted. Continue reading
Update 2: Simple clean up solution: http://blog.sucuri.net/2010/05/simple-cleanup-solution-for-latest.html
Update 1: Note that we are not blaming WordPress here. I am assuming that if the problem was on WordPress itself, the number of infected sites would be much much bigger. Maybe a plugin is vulnerable or someone stole lots of passwords. Also, all the hacked sites were on shared hosts, no one so far on a private server.
We are seeing multiple reports today of WordPress sites (running their latest version) getting compromised. The initial reports today were restricted only to Dreamhost, but now we are seeing the same pattern on blogs hosted at GoDaddy, Bluehost, Media temple and other places. Continue reading
March 8, 2010 11:34 AM ET
George Kurtz, CTO of McAfee Security, revealed new details of the recent attack on Google and other companies in a blog post this afternoon. A “zero-day” bug–a previously undiscovered vulnerability–in Microsoft’s Internet Explorer browser seems to have been a key part of the attack.
The attack on Google’s infrastructure, which Kurtz calls “Operation Aurora,” was able to steal some of the Web giant’s intellectual property, apparently in the process of pursuing access to the e-mail accounts of Chinese human-rights activists. Google has said that the same attack hit at least 20 other large companies. Continue reading
This article was posted by mac Hacker at Blogspot, and explains how to get your Norton Antivirus subscription to continue past its expiration date. So, when that annoying subscription window pops up and you ask yourself, “How would I make the subscription reset itself?” you can do it yourself. The PHP Kemist does not recommend you evade your obligation to pay for software and subscriptions, and this article is for the Mac hackers who are curious. Continue reading
A company calling itself “SEO Marketing” is sending mocked-up invoice layouts to trick companies into purchasing non-existent SEO services. The scan involves sending a letter or fax to a company’s billing department in the hopes it will be perceived as a bill to be paid, and overlooked as complete scam garbage.
People have been asking us why they get images in their spam and junk emails. They’re obviously garbage and yet so much effort has been used to generate them. We’ll try to answer this question… Continue reading