July 20, 2010

LATEST CYBER NEWS, CYBER FORENSICS, CYBER CRIMINALS, CYBER EXPERTS, NEWS , INFORMATION IN INDIA AND ACROSS THE GLOBE

A page for budding professionals in the field of cyber Forensics. This is a place where cyber forensics across India can share and gather news, info, new discovery, softwares in field of cyber space.

JOIN US NOW!! :)

The Firefox-maker will now pay out $3,000 for finding a flaw :)

1. Mozilla's bug bounty "keeps IT talent from e-crime"

Mozilla's increased bug bounty could help prevent foreign IT talent from turning to e-crime, claims one security firm.
Mozilla raised the bounty it pays for bugs from $500 to $3,000 last week, as the open-source developer thinks it's wise to keep the payout high to encourage researchers to hand such flaws to them rather than hackers.
"A lot has changed in the six years since the Mozilla program was announced, and we believe that one of the best way to keep our users safe is to make it economically sustainable for security researchers to do the right thing when disclosing information," wrote Lucas Adamski, director of security engineering, in a post on the Mozilla security blog.


Read more: Mozilla's bug bounty "keeps IT talent from e-crime" | Security | News | PC Pro http://www.pcpro.co.uk/news/security/359605/mozillas-bug-bounty-keeps-it-talent-from-e-crime#ixzz0uF7K7yQs


2. Adobe adding 'sandbox' to PDF Reader to ward off hacker attacks


The next major version of Adobe’s PDF Reader will feature new sandboxing technology aimed at curbing a surge in malicious hacker attacks against the widely deployed software.

The security feature, called “Protected Mode,” is similar to the Google Chrome sandbox and Microsoft Office 2010 Protected Viewing Mode, according to Adobe’s security chief Brad Arkin.


In an interview, Arkin said the sandbox is scheduled for release before the end of this year and is based on Microsoft’s Practical Windows Sandboxing technique. The sandbox will be turned on by default and will display all operations in a PDF file in a very restricted manner.

“Should Adobe Reader need to perform an action that is not permitted in the sandboxed environment, such as writing to the user’s temporary folder or launching an attachment inside a PDF file using an external application (e.g. Microsoft Word), those requests are funneled through a “broker process,” which has a strict set of policies for what is allowed and disallowed to prevent access to dangerous functionality,” Arkin explained.

Read at : http://www.zdnet.com/blog/security/adobe-adding-sandbox-to-pdf-reader-to-ward-off-hacker-attacks/6886

3. E.U. Plans to Limit Its Use of Private Personal Data

The European Commission currently oversees a large number of mechanisms designed to combat crime, in particular terrorist activity. The vast majority of these instruments involve the collection, storage or exchange of personal data for law enforcement or migration management.

"Citizens should have the right to know what personal data are kept and exchanged about them," said Cecilia Malmström, E.U. Commissioner for Home Affairs, announcing the new rules on Tuesday.

All future policy proposals will be assessed for their expected impact on individuals' rights and their proposers must prove that the initiatives are necessary, proportionate and safeguard fundamental rights. There must also be a clear allocation of responsibilities, as well as structured review procedures. Compliance with these rules on personal data protection will be subject to control by an independent authority at national or E.U. level.

http://www.pcworld.com/businesscenter/article/201467/eu_plans_to_limit_its_use_of_private_personal_data.html



WANT MORE INFORMATION ON CYBER FORENSICS, CYBER RESEARCH AND LATEST FOLLOW US ON FACEBOOK:





http://www.facebook.com/pages/Forensic-Cyber-Experts-in-India/132429826787124

Featured Post

IFO ANNOUNCES - TRAINING PROGRAMS 2017