SnugglesTheBear writes "Well it would appear that the Amazon Cloud is down due to technical difficulties. This, as many redditers have noticed, has effected a large portion of the Internet including many startups and popular services. I would like to open a discussion over whether cloud computing really the future or is this putting too many eggs in one basket? With such a central point of failure, it would appear so, but the affordable prices of cloud computing makes it very attractive. Could this be the start of a caste-like system on the Internet where poorer websites all go offline simultaneously?"Link to Original Source
SnugglesTheBear writes "'The browser, which is based on version 3.6 of Firefox, comes with Adobe Reader and Flash plug-ins, as well as the ability to create 'white' and 'black' lists of the processes that may be started during web surfing as well as the sites that can be visited.
"Limiting browser use to specific sites can control usage and protect from cross-site scripting attacks. By specifying which sites are to be blocked, it makes it easy to keep users away from known bad sites, and thereby limit their exposure to attacks," Dell said.' Coupled with the malware shipped in Dell's motherboards, you will still have an infected machine, but perhaps this can help.."Link to Original Source
SnugglesTheBear writes ""Bot herders and the crimeware gangs behind banker Trojans have had a lot of success in the last few years with using bulletproof hosting providers as their main base of operations. But more and more, they're finding that social networks such as Twitter and Facebook are offering even more fertile and convenient grounds for controlling their malicious creations.
New research from RSA shows that the gangs behind some of the targeted banker Trojans that are such a huge problem in some countries, especially Brazil and other South American nations, are moving quietly and quickly to using social networks as the command-and-control mechanisms for their malware. The company's anti-fraud researchers recently stumbled upon one such attack in progress and watched as it unfolded.""Link to Original Source
SnugglesTheBear writes ""A hacker claims to have cracked the Skype’s proprietary encryption protocols that protect the VoIP company’s intellectual property.
The Luxembourg IP telephony company has zealously guarded its protocol but a hacker going by the name of ‘Sean O’Neil’ claims that he’s broken through the protection. On his blog, he praised Skype’s protection and explained the difficulty involved in breaking it. “'For over 10 years, Skype enjoyed selling the world security by obscurity. We must admit, really good obscurity. I mean, really really good obscurity. So good that almost no one has been able to reverse engineer it out of the numerous Skype binaries. Those who could, didn’t dare to publish their code, as it most certainly looked scarier than Frankenstein.'"
Though most sites were taken down almost immediately, there is still a cache of the original post."Link to Original Source
SnugglesTheBear writes "A new trojan has been spotted that acts as an antivirus update then utilizes the Windows input method editor (IME) to inject a system, technology that normally creates a means for users to enter characters not supported with their input device such as inputting Chinese characters etc. The fake IME file is really a DLL. The article details the steps the trojan takes."Link to Original Source
SnugglesTheBear writes ""New research pours scorn on the comforting but erroneous belief that Windows surfers who avoid smut and wares on the web are likely to avoid exposure to malware.