Opening up Visual Studio and .NET to Every Developer

Visual Studio and .NET have been two bedrocks of the Microsoft developer ecosystem for over a decade.  With over 1.8 billion installations of .NET and over 7 million downloads of ...

aspsublime

New DNS Amplification Attacks Use Text

Cybercriminals have started a new trend for conducting distributed denial-of-service (DDoS) attacks and rely on a type of DNS (Domain Name System) amplification that leverages text records for making the ...

New-DNS-Amplification-Attacks-Use-Text-from-White-House-Press-Release-464732-2

11 ways to boost your online store’s credibility

Anyone who has built an ecommerce store before, knows this: credibility is one of the toughest things to achieve. Apart from having to build something from scratch and set it up ...

1

Banking Trojan Dridex Delivered Through Microsoft Word Macros

A change in the distribution method for Dridex banking Trojan has been observed last week, as attackers rely on Microsoft Word documents with malicious macros in order to download the ...

Banking-Trojan-Dridex-Delivered-Through-Microsoft-Word-Macros-463259-2

Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks

A browser-based keystroke interception tool called ScanBox has been observed to be wielded by several threat actors targeting a diverse set of organizations in the US, China, Korea and Japan. Unlike ...

Keylogging-Framework-Used-By-Multiple-Actors-In-Watering-Hole-Attacks-463304-2
November - 13 - 2014
aspsublime

Visual Studio and .NET have been two bedrocks of the Microsoft developer ecosystem for over a decade.  With over 1.8 billion installations of .NET and over 7 million downloads of Visual Studio 2013 in just the last year, Visual Studio and .NET are enabling millions of developers to build some ...

November - 12 - 2014
New-DNS-Amplification-Attacks-Use-Text-from-White-House-Press-Release-464732-2

Cybercriminals have started a new trend for conducting distributed denial-of-service (DDoS) attacks and rely on a type of DNS (Domain Name System) amplification that leverages text records for making the operation more effective; in some campaigns parts of a press release from the White House has been observed by researchers. The ...

November - 4 - 2014
1

Anyone who has built an ecommerce store before, knows this: credibility is one of the toughest things to achieve. Apart from having to build something from scratch and set it up so that it works every time, building credibility means gaining customer trust. And if you can't provide a functional online ...

October - 29 - 2014
Banking-Trojan-Dridex-Delivered-Through-Microsoft-Word-Macros-463259-2

A change in the distribution method for Dridex banking Trojan has been observed last week, as attackers rely on Microsoft Word documents with malicious macros in order to download the malware onto targeted computers. Dridex is the latest evolutionary link of the Feodo/Bugat/Cridex Trojan that developed into Geodo. It preserves the ...

October - 29 - 2014
Keylogging-Framework-Used-By-Multiple-Actors-In-Watering-Hole-Attacks-463304-2

A browser-based keystroke interception tool called ScanBox has been observed to be wielded by several threat actors targeting a diverse set of organizations in the US, China, Korea and Japan. Unlike other tools used in watering-hole attacks, which are built to deliver exploits that would lead to compromising computers of visitors ...

October - 23 - 2014
startup-asia-jakarta-2014

Startup Asia Jakarta merupakan acara tahunan Tech In Asia yang mempertemukan pengembang aplikasi, investor, pelajar, media, dan pelaku industri TI akan kembali digelar di tahun 2014 ini. Acaranya akan digelar pada tanggal 26 hingga 27 November 2014 di Plaza Bapindo, Jakarta. Dalam Startup Asia Jakarta 2014 ini akan terdapat beberapa acara menarik, ...

October - 22 - 2014
Sucuri-Malvertising-Raw-Ad-Payload1

A few weeks ago we wrote about compromised websites being used to attack your web routers at home by changing DNS settings. In that scenario the attackers embedded iFrames to do the heavy lifting, the short fall with this method is they require a website to inject the iFrame. As ...

October - 21 - 2014
MTI1MzMyNzY2NzM1NzY4MDMw

or the last few months, any Android app maker who wanted to check out the latest version of Google’s mobile operating system had the Android L Developer Preview to play with. Now, "L" has taken on a few more letters to become "Lollipop," and on Friday, the full release of ...

October - 16 - 2014
lollipop

We knew it was coming. It had to be. Every one of the last half-dozen or so major builds of Android has gotten a sweetly-themed name — and yet, Google had referred to Android 5.0 as nothing but “L” ever since its debut back at Google I/O. It’s now official: Android ...

October - 15 - 2014
dronecode-examples

The folks who help bring you the Linux operating system today want to bring you better drones tomorrow. The Linux Foundation, which sponsors some development of the widely used operating system, announced the new open-source Dronecode software project. Dronecode brings a formal structure and oversight to two existing open-source drone projects, ...

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube

Search Site

Popular Posts

Review: The Apple iP

In these times we have little opportunity for mystical religious ...

Everything you need

The iPhone OS 4.0 event just wrapped up and the ...

The end of SQL and r

The road to SQL started with Dr. E.F. Codd's paper, ...

Microsoft Arc Keyboa

I am losing the war on clutter. Apparently my desk ...

John Shepherd-Barron

John Shepherd-Barron, the Scotsman credited with inventing the world's ...

Sponsors