http

No Image

Are your tweets through Tweeterfeed and Ping.fm no longer published ?

Are you using Tweeterfeed and Ping.fm ? Are your tweets no longer published ? Then you didn’t read Twitter’s post here: http://dev.twitter.com/ June 30, 2010 The @twitterapi team will be shutting off basic authentication on the Twitter API. All applications, by this date, need to switch to using OAuth. Read more » So, the solution is to switch to OAuth. Ping.fm is now able to use this : https://ping.fm/twitter/ Guys at Tweeterfeed and ping.fm : are you stupid ?! You f** up a lot of messages and you made a lot of people in this world ! Shame on you.



No Image

The wrong way of being in the news

“70 Romanian Phishers & Fraudsters Arrested On March 4th, FBI Director Robert Mueller was given a speech on Cybercrime to the RSA conference where he mentioned that: And we have worked with the Romanian National Police to arrest more than 100 Romanian nationals in the past 18 months. Four years ago, several American companies threatened to cut cyber ties with Romania because of the rampant hacking originating from that country. And yet today, Romania is one of our strongest partners. ” Read more here: http://garwarner.blogspot.com/2010/04/70-romanian-phishers-fraudsters.html






No Image

Viruses and Digital Signatures

Very interesting stuff: http://www.symantec.com/connect/blogs/viruses-and-digital-signatures Although the files are signed, they are signed using an unauthenticated CA (Certificate Authority) which is masquerading as Verisign. A CA is a trusted third party that issues and signs the certificate and vouches for the authenticity of the file. Each CA should be registered and therefore recognized globally as a trusted signer. The signature on the certificate is verified by the signer’s public key.



No Image

Quoted by it-republik.de

http://it-republik.de/php/news/Security-Hinweise-zu-Facebook-Anwendungen-und-mehr-053600.html Sorin Mustaca von Avira berichtet, dass Googles Chrome in Version 4 durch ‘Extensions’ erweitert werden kann, die von Google in der ‘Extension Gallery’ gesammelt und bereit gestellt werden – ohne ihre Funktionsfähigkeit oder Verhalten zu prüfen, so dass bösartigen Extensions Tür und Tor offen stehen. and the original article: http://techblog.avira.com/2010/01/27/google-chrome-4-now-with-extensions/en/


%d bloggers like this: