Sunday, November 04, 2007

Weekend Reading

New Hacking Service Site
A client can ask in advance for a certain number of infections, say 1,000 infections for a $200 fee. Customers can also pay for loads based on country, IP addresses or other attributes. This service is another example of a service-based hacking product, similar to others recently reported here, that opens up Internet crime to less technically proficient criminals. Rather than compete with some of the other services, it actually complements them.

Take a look HERE.

==================================================================
Vinyl May Be Final Nail in CD's Coffin
As counterintuitive as it may seem in this age of iPods and digital downloads, vinyl -- the favorite physical format of indie music collectors and audiophiles -- is poised to re-enter the mainstream, or at least become a major tributary. Talk to almost anyone in the music business' vital indie and DJ scenes and you'll encounter a uniformly optimistic picture of the vinyl market.

Take a look HERE.

==================================================================
Leopard vs. Vista: feature chart showdown
There's no doubt, Vista and Leopard are both extremely advanced, feature rich consumer operating systems. This chart is only for out of box features, and does not take into account 3rd party software. We realize that with a few choice apps this chart would look completely different -- but that's not what we're after here. So, did we forget anything? Let us know, this chart ain't static, and we'll be updating as necessary.

Take a look HERE.

==================================================================
How to Interview an Insider Threat Suspect
Has your database administrator breached your company's sensitive customer data? Ask him -- then watch to see if he repeatedly scratches the tip of his nose or pulls on his earlobes. It may sound strange, but nonverbal communication can be an important element to watch when interviewing a suspected "insider" about a system compromise, according to experts in breach investigation and forensics.

Take a look HERE.

==================================================================
Google your carbon footprint
Google has added a cute service that allows users to calculate their carbon footprints, receive advice on how to reduce it and place their details on a map of the UK.

Take a look HERE.


==================================================================
OpenSocial opens new can of worms
When Google announced that its new social-networking initiative would extend to any site that wanted to participate, the land grab for the social Web's attention just got a whole lot more intense.

Take a look HERE.

==================================================================
Dinosaur Sightings: 1970s computers
This [photo] gallery showcases several 1970s-era machines from Steven Stengel's vintage computer collection. Stengel has graciously allowed CNET to republish his photos and descriptions. You can find much more detailed information on each machine and additional photos of the collection on his Web site Oldcomputers.net

Take a look HERE.

==================================================================
First Line of Defense for Web Applications – Part 3
Precaution: Are you consuming Unexpected Input - Technology is developing fast and web programming languages are coming up with features or ways to ease the job of our developers. Although it brings a smile on developers face, there is a flip side to this. Attackers are exploiting these shortcuts to pass unexpected input in the applications and exploiting the applications.

Take a look HERE.

==================================================================
Online data backup can save files from disaster
You saw it in the footage of Californians fleeing their homes from horrific wildfires. They grabbed a few priceless photos and ran. What if you're not lucky enough to get to the photo albums? Maybe you've digitized your old pictures and backed them up on discs or an external hard drive. But that does no good if natural disaster hits, and you can't get to them in time. And what about the rest of your digital life — music, videos and the like?

Take a look HERE.

==================================================================
Call centre employees more dangerous than phishers
Banks are fighting to keep their call centres free from criminals that pose as -- or become -- call centre staff in order to steal customer details. Just two years ago, phishing was the greatest threat to the security of JP Morgan Chase's customers. Today, the company is far more worried about the people manning its call centres.

Staff have been caught stealing customer information using mobile phones, cameras and USB drives, said Iain Johnston, fraud specialist at JP Morgan Chase Asia Pacific.

Take a look HERE.

==================================================================
Most Consumers Clueless About Online Tracking
Every single move you make online can, and often is, tracked by online marketers and advertising networks that gather and use the information for serving up targeted advertisements. But the average American consumer is largely unaware that such tracking goes on, the extent to which it is happening or how exactly information is being used.

Take a look HERE.

0 Comments:

Post a Comment

<< Home