See also IT News - DDoS Attack On Wikileaks Boosting - tetrahedrassface writes "According to the Twitter feed for Wikileaks, the assault on the controversial site is boosting and is now at 10 Gigabits per second. In light of the recent release of highly sensitive documents and calls by many lawmakers around the world to swiftly find,
microsoft office x64, extradite, and try suspected rapist Julius Assange for breaches of national security,
microsoft windows 7 ultimate 32bit key, one nation, Ecuador,
office Home And Business activation key, has offered asylum." - Facebook's 'Like This' Button Is Tracking You - Stoobalou submitted a story about some of the most obvious research I've seen in a while ... "A researcher from a Dutch university is warning that Facebook's 'Like This' button is watching your every move. Arnold Roosendaal, who is a doctoral candidate at the Tilburg University for Law, Technology and Society, warns that Facebook is tracking and tracing everyone, whether they use the social networking site or not. Roosendaal says that Facebook's tentacles reach way beyond the confines of its own web sites and subscriber base because more and more third party sites are using the 'Like This' button and Facebook Connect." - GNU Savannah Site Compromised - Trailrunner7 writes "A site belonging to the Savannah GNU free software archive was attacked recently,
microsoft windows 7 starter license, leading to a compromise of encrypted passwords and enabling the attackers to access restricted project material. The compromise was the result of a SQL injection assault against the savannah.gnu.org site within the last couple of days and the site is still offline now. A notice on the site says that the group has finished the process of restoring all of the data from a clean backup and bringing up access to some resources, but is still in the middle of adjusting its security settings." - Aussie Government Gives PDF the Thumbs Down - littlekorea writes "The central IT office of the Australian Government has advised its agencies to offer alternatives to Adobe's Portable Document Format to ensure folks with impaired vision are able to consume information on the Web. A Government-funded study found that PDFs can present themselves as image-only files to screen readers, rendering the information contained within them unreadable for the vision impaired." - Assault of the Trojan Printers - snydeq writes "Security professionals are tapping Trojan horse access points cloaked in printers and other office equipment to infiltrate clients who want their defenses tested,
microsoft windows 7 starter 64bit key, InfoWorld reports. Attackers dressed in IT supplier uniforms drop off printers to a company for a test-drive. Once the device is connected to the network, the penetration testers have a platform behind any perimeter defenses from which to assault. 'You can put your box inside a printer tray and glue it shut, and who will notice if there are one or two or three power cables coming out?' one security researcher says of the method. A variant of the assault, presented by Errata Security at the Defcon hacking convention, uses an attack-tool-laden iPhone mailed to a target company to get inside the firm's network defenses."