Search Results for: Adobe

11 Open-Source Solutions for Small Businesses

PC World has listed 11 useful open-source applications small businesses should consider when shopping for office software. Instead of spending a small fortune on proprietary software, why not take advantage of these free to use, free to distribute and free to modify software? Here are PCWorld’s picks: 1. Office productivity: …

Read More »

Jailbreak Exploit for iPhone Targets PDF

Following the recent ruling by the Library of Congress’ Patent Office,  an app called JailbreakMe 2.0 has become available that enables users to jailbreak the iPhone and iPod touch. The app uses a PDF exploit for approximately 20 different combinations of hardware and software, according to security researchers at F-Secure. …

Read More »

Fake Anti-Virus Pretends to be Firefox/Flash Update to Dupe Users

Fake anti-virus slingers utilize a variety of methods to convince unsuspecting users to download and pay for their products, including using scareware tactics. However, scammers have now found a new method that fakes the Firefox “Just Updated” page which appears after Firefox has been updated, according to researchers with F-Secure. …

Read More »

DDoS Attack Takes Out Web Host

Web hosting provider Media Temple was hit by a distributed denial of service (DDoS) attack earlier this week. The attack, which appeared to emanate from outside the United States, began sometime in the afternoon on Tuesday and took down the domain servers for around 2.5 hours. “Due to the sophistication …

Read More »

Executive Profile: Bill Goodson of Autodesk

Bill Goodson is Vice President of Federal Government Sales for Autodesk, a computer design software company. As VP of Federal Sales, Goodson is responsible for managing business within federal markets and directing consumer-based strategies for state and local government. His sales leadership and public sector business is one of the …

Read More »

Attacks Using PDF Exploits on the Rise

When hackers look assemble their tools to carry out attacks, they often look to exploit commonly used platforms in an effort to increase the number of potential targets. This is why more hackers write viruses for PCs instead of Macs, since the majority of the world’s computer users utilize PCs. …

Read More »

Congress Slammed with Cyber Attacks

The number of cyber attacks against Congress and governmental agencies has grown into the billions in the last year. In the start of 2008, attacks including worms, Trojan horses and spybots only numbered 8 million per month. That number now stands at 1.8 billion attacks per month, according to Senate …

Read More »

Blocking Drive-By Downloads

Researchers from Georgia Tech and SRI International are set to release a new technology that would block ‘drive-by’ downloads. The free tool, called BLADE (Block All Drive-By Download Exploits), blocks any downloads not initiated by the user. Drive-by downloads are when a user visits an infected website and malicious software …

Read More »

The Chinese Are Coming: Cyber Espionage Targets Government Contractors

U.S. government networks are consistently probed for vulnerabilities by hackers and foreign intelligence agencies. The difficulty of attribution combined with the ease of access and decreased physical risk makes cyber espionage a favorite tool of more advanced intelligence services. Foreign governments seek information for U.S.-based networks for a variety of …

Read More »

Cyber Spies Attempt to Target Government Contractors

Government contractors often work on a variety of classified or sensitive projects for the US government. As such, they serve as a prime target for foreign espionage agencies seeking to gain information on defense technologies and programs. Unidentified hackers have begun targeting government contractors through corrupted PDF files. The attachments …

Read More »

Firefox Helps Secure Rival Software

When software providers point out the flaws of competing technologies, it is often in an attempt to demonstrate the superior security of their own products. Mozilla Firefox has taken a more community-based common security approach. When users update Mozilla Firefox, a security reminder appears if the user is running an …

Read More »

SANS Institute Report on Top Cyber Risks

The SANS Institute published a report Tuesday highlighting the top cyber risks based on data collected from government and the private sector. According to the report, websites and unpatched software are the greatest cyber risks. More than 60 percent of attacks on the Internet are against websites and often take …

Read More »