Integrity
Description:

Information cannot be created, changed, or erased; without proper authorization.

The so-called Twitter follower “bug”

On May 5, 2010, on an obscure website in Turkey, someone described a method that allows you to make any Twitter user, of your choosing and without their consent, into one of your followers. This is no “bug” folks — It is a backdoor…

Updated — MocoSpace reveals private e-mail addresses

Vulnerabilities exist in social networking sites such as MocoSpace that, when exploited, can disclose the private e-mail address of targeted users. These vulnerabilities are caused by the interaction of the site’s internal e-mail system, with the external e-mail system that hosts a user’s private e-mail account.

Caveat on Verizon Droid 2.1-update1 OTA update lock pattern fix

My Motorola Droid finally received the much anticipated Over The Air (OTA) software update (version 2.1-update1) from Verizon Wireless. So, is the Verizon Droid pattern lock bypass fixed? Yes. But there is one little caveat…

Waging Information Warfare over KB971033

For users who allow Windows to automatically download and install changes on their computers, they will not be affected. But if you believe that your explicit knowledge and consent is required, in order to affect changes to your computer; Microsoft has declared Information Warfare on you.

Being “gaslighted” by Windows 7

On February 11th, Microsoft General Manager Joe Williams, discussed the upcoming Windows Activation Technologies Update for Windows 7. While this is considered an “important update,” he went on to “…stress that the Update is voluntary.” So what did Joe mean by important update, but voluntary? I found out this morning.

A (temporary) countermeasure for the Verizon Droid pattern lock bypass

It has been observed that, as long as a Bluetooth device is paired, AND CONNECTED, to the Droid; the pattern lock bypass vulnerability does not occur.

Verizon Droid pattern lock bypass

One of the interesting features of Android smart-phones is the pattern lock screen. Instead of a four digit PIN, the phone is secured with a “pattern” of four to nine dots, arranged in a 3 by 3 square. This results in a possible 3,024 to 362,880 different combinations. Sounds pretty secure, right?

The GSM encryption “hack,” & how it affects you

The Wall Street Journal reports that German “hacker” Karsten Nohl demonstrated how it was possible to break the security of GSM cell phones, and to monitor conversations and text messages as they take place. However, before anyone starts fearing for their privacy, let us assess the real risk posed by this so-called breakthrough.

Legislation of software design

The Informed P2P User Act (HR 1319) makes it illegal for P2P software to inadvertently share files over a P2P network without a user’s knowledge.

Pirates versus Internet Service Providers

Court orders ISP to disconnect The Pirate Bay from the Internet. But the lack of an adequate Disaster Recovery and Contingency Plan (DRCP) left it unprepared for what happened next.