Join 3,374 readers in helping fund MetaFilter (Hide)

2 posts tagged with security by Nelson.
Displaying 1 through 2 of 2.

Related tags:
+ (70)
+ (63)
+ (61)
+ (47)
+ (44)
+ (44)
+ (43)
+ (36)
+ (36)
+ (32)
+ (26)
+ (26)
+ (25)
+ (20)
+ (19)
+ (19)
+ (18)
+ (18)
+ (18)
+ (18)
+ (17)
+ (17)
+ (16)
+ (16)
+ (16)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (13)
+ (13)
+ (13)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (11)
+ (11)
+ (10)
+ (10)
+ (10)
+ (10)
+ (10)
+ (10)
+ (10)
+ (9)
+ (9)
+ (9)
+ (9)
+ (9)
+ (8)
+ (8)
+ (8)
+ (8)
+ (8)
+ (8)


Users that often use this tag:
homunculus (20)
mathowie (15)
Postroad (10)
Steven Den Beste (7)
scalefree (7)
zarq (6)
jeffburdges (6)
skallas (5)
tranquileye (5)
digaman (5)
amberglow (5)
Blazecock Pileon (5)
vidur (5)
Artw (4)
unSane (4)
chunking express (4)
fenriq (4)
crunchland (4)
kliuless (4)
Irontom (4)
These Premises Are... (4)
the man of twists ... (4)
baylink (3)
netbros (3)
thescoop (3)
bkdelong (3)
ed (3)
semmi (3)
DBAPaul (3)
rzklkng (3)
dejah420 (3)
allkindsoftime (3)
Unregistered User (3)
Foci for Analysis (3)
Abiezer (3)
paleyellowwithorange (3)
stoneweaver (3)
beisny (3)
Wordshore (3)
Zarkonnen (2)
infini (2)
flabdablet (2)
russilwvong (2)
Malor (2)
madamjujujive (2)
orange swan (2)
Nelson (2)
XQUZYPHYR (2)
omidius (2)
Ignatius J. Reilly (2)
specialk420 (2)
daHIFI (2)
laz-e-boy (2)
y2karl (2)
tommasz (2)
mrgrimm (2)
trioperative (2)
fold_and_mutilate (2)
srboisvert (2)
feelinglistless (2)

Flashback MacOS botnet

Flashback is the first significant MacOS botnet, reportedly infecting and controlling over half a million Macs. Flashback has been around for since September 2011 but recently got a boost with a Trojan that exploits a security hole in Apple's Java distribution; a vulnerable Mac can be infected simply by visiting a web site, no user password required. Apple released a fix for the Java exploit yesterday, some six weeks after Microsoft, Adobe, and Oracle released their fixes.
posted by Nelson on Apr 4, 2012 - 174 comments

DigiNotar SSL certificate compromise

Two days ago a user asked Google about a strange warning he was getting when trying to access Gmail from Iran. Turns out he was getting a fraudulent SSL certificate that was issued incorrectly for *.google.com by DigiNotar, a Dutch certificate authority. It seems likely this was a deliberate man-in-the-middle attack to snoop email in Iran. This attack is the second SSL certificate compromise in a year (previously), pointing to a fundamental design flaw in Internet security. [more inside]
posted by Nelson on Aug 30, 2011 - 45 comments

Page: 1