No Picture
Internet

ubiQ-Freedom UTM (Unified Threat Management) Software for Free

ubiQ-Freedom is a Free & Open Source UTM (Unified Threat Management) Appliance Software. UTM software provides comprehensive solution for the primary network gateway defense solution for organizations, including the ability to perform multiple security functions in one single appliance: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing and on-appliance reporting.
[…]

No Picture
Microsoft

Security Update for 17 Year Old Windows Bug!

Google security researcher discovered an ancient bug in Windows, which involves a utility that allows newer versions of Windows to run very old programs and exploit this utility in Windows XP, Windows Server 2003 and 2008 as well as Windows Vista and Windows 7. This bug dates from the DOS era! This bug will be patched by Microsoft in its February security update for Windows. The update also tackles bugs in Office XP, Office 2003 and Office 2004 for Apple Macintosh machines. […]

No Picture
Internet

TCS Website (tcs.com) Hacked and Put for Sale!

The official website of Tata Consultancy Services, TCS.com, has been hacked. The homepage says “This domaine name is for sale. Please contact us for further informations. [email protected]”. We have accessed the hacked website at 2:30PM, 7-Feb, in India. It is rumored that, the hackers have made changes to the DNS settings of the website. TCS is maintaining many of the government websites and this case points out the immaturity of TCS. Let us hope that, this will be an eye opener for major Indian software firms. […]

No Picture
Internet

Oracle Database Vulnerable to Remote Hacking – Researcher

A computer security expert has uncovered a flaw in the Oracle Database that could let hackers remotely access sensitive information in corporate and government databases via the Internet. It allows an attacker without a user ID and password to take complete control. All firewalls become irrelevant. This is revealed at the Black Hat hacking conference in Washington. The researcher believes about nine out of every 10 Oracle databases are vulnerable to attack. […]

No Picture
Internet

Should Adult Porn Websites be Banned in India?

The Chief Justice of India said that there was an urgent need to ban websites that circulate pornography. Do you agree with the CJI? Will this be against the freedom of speech and expression? Is it like Talibanism, if implemented? I agree that nobody should be shown online porn or porn advertisements without their permission.If someone is wants to browse a porn site, they should be given a warning message for the first time before they enter inside the adult-only website. […]

No Picture
General

Chinese Cyber Attack on India Government Offices Too?

Mr M K Narayanan told The Times that his office and other government departments were targeted on December 15. A ‘Trojan’ virus was embedded in an e-mail PDF attachment. The virus was detected and officials were told not to log on until it was eliminated. This was not the first instance of an attempt to hack into India’s computers. People seem to be fairly sure it was the Chinese. China has denied any role in the hacking attacks. […]

No Picture
Browser

French and German Govts Warned People Not to Use Internet Explorer

The information security department of France urged Internet users to avoid Microsoft’s browsers IE 6, 7 and 8 because of a weakness that allows hackers to infect the system. The German Federal Office for Information Security, said that flaws in the Microsoft systems let hackers start and lock computers that have a Windows operating system, and thus urged not to use it. […]

No Picture
Google

Internet Explorer Flaw Exploited for Cyber Attack on Google

McAfee said that, the recent cyber attacks on Google and 20 other businesses in the US exploited a previously unknown flaw in Internet Explorer browser.All recent versions of Internet Explorer for the Windows operating system, including Windows 7, are vulnerable. Using Internet Explorer in “protected mode” with security settings at “high” would limit the impact of the vulnerability. […]

No Picture
Google

Google.cn may Shutdown, Issue Over Cyber Threat and Internet Freedom

In a recent blog post titled A new approach to China, Google announced that, Google may shut down their Chinese search engine Google.cn and close down their operations in China. This decision was taken in the wake of the recent cyber attacks on Google and a few other organizations, to get information from Gmail accounts of Chinese human rights activists. The attacks were originated from China. In mid-December Google faced highly sophisticated and targeted cyber attacks on their corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. […]

No Picture
Mobile Apps

Mobile Security for Smartphone (Symbian & Windows Mobile) by F-Secure

F-Secure Mobile Security offers complete security for smartphones. The application is easy to install and smooth to use without affecting the smartphone’s performance. This complete security package includes a firewall, real-time anti-virus and anti-spyware to protect against mobile malware, and a remote control anti-theft feature that safeguards your confidential information even if the phone is lost or stolen. It provides features such as Remote Lock, Theft Control, Remote Wipe and Advanced automatic security updates. Get a free trial at f-secure.mobi. […]