Monthly Archives: February 2009

New style of DNS amplification can yield powerful DDoS attacks

A new class of distributed denial-of-service (DDoS) attacks, which can overwhelm even mainstream targets, is imminent, a security researcher warned this week. DNS amplification was first widely publicized about three years ago when computer security experts Gadi Evron and Randal

Malware can turn off UAC in Windows 7 Beta version

Computer security Researchers have found a potentially serious vulnerability in the User Account Control (UAC) applied in Windows 7. Microsoft is denying that there is a security hole in the UAC (User Account Control) feature of Windows 7 “I can

Google working on fix for clickjacking vulnerability in Chrome

Researcher Aditya Sood published the Chrome clickjacking vulnerability PoC on Wednesday. He said he was impressed that Microsoft attempted to fix the clickjacking issue in IE8 and this drove him to examine whether the problem exists elsewhere. “The motto behind

Computing in the Cloud Models- Right Now

In the last months there has been a rapid increase in investment in the Cloud Computing and related areas. This growth is due to the demand for virtual “cloud” resources, the Idea of Cloud Computing is near another approach called