| Friday October 31st 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

Running Windows viruses with Wine

Running Windows viruses with Wine

It just isn't fair that Windows users get all the viruses. I mean really, shouldn't Linux users be in on the fun as well? Well... thanks to the folks running the Wine project, Linux users can "catch the virus bug" too -- sort of. Linux just isn't user-friendly when it comes to viruses. You have to work to find and run them. It doesn't happen [...]

Marine One security breached

Marine One security breached

A company that monitors peer-to-peer file-sharing networks has discovered a potentially serious security breach involving President Barack Obama's helicopter, NBC affiliate WPXI in Pittsburgh reported Saturday. Employees of Tiversa, a Cranberry Township, Pa.-based security company that specializes in peer-to-peer technology, reportedly found [...]

Four Threats For 2009 That You’ve Probably Never Heard Of (Or Even Thought About)

Four Threats For 2009 That You’ve Probably Never Heard Of (Or Even Thought About)

You're probably gearing up for the well-known security risks you've watched emerge over the past year to go front burner in the new year -- the insider threat, Web 2.0, and targeted attacks. But don't pop that champagne cork just yet: Some obscure potential threats that could be more difficult to prepare for and defend against also are looming for [...]

New XSS Attack Builds An Anonymous Network

New XSS Attack Builds An Anonymous Network

A pair of researchers has combined cross-site scripting (XSS) and anonymization techniques to build a framework that lets an attacker gather Web content incognito. "Our goal was to retrieve Web content anonymously," says Matthew Flick, principal with FYRM Associates, who, along with fellow researcher Jeff Yestrumskas, demonstrated the XSS [...]

sslstrip: hijacking SSL in network

sslstrip: hijacking SSL in network

Last week at Black Hat DC, Moxie Marlinspike presented a novel way to hijack SSL. You can read about it in this Forbes article, but we highly recommend you watch the video. sslstrip can rewrite all https links as http, but it goes far beyond that. Using unicode characters that look similar to / and ? it can construct URLs with a valid certificate [...]

Forget your photo ID for your EasyJet flight? Just go print one up!

Forget your photo ID for your EasyJet flight? Just go print one up!

Don't worry if you show up for your domestic UK EasyJet flight without the mandatory photo ID the airline now requires; the helpful check-in clerks will direct you to the nearby train station where they'll make you up a free photo-card to go with a rail-pass, should you ever decide to buy one. Ah, security. "They suggested I go to the railway [...]

Prison Break: Greek Style

Prison Break: Greek Style

Two of Greece's most wanted men have staged a daring helicopter escape from Athens' highest-security prison - for the second time in three years. Serial armed robber and kidnapper Vassilis Paleokostas and his Albanian sidekick Alket Rizai were days away from trial for their 2006 escape. They fled Korydallos prison after a helicopter landed [...]

HOWTO: Exploit Bluetooth Headsets

Here's a pretty basic "how to" on connecting your PC to Bluetooth devices. When connected, you may send sound files to the Bluetooth device and/or record anything said into a bt headset. Neat for a Linux beginner.

Body scanners replace metal detectors in tryout

Body scanners replace metal detectors in tryout

WASHINGTON — For the first time, some airline passengers will skip metal detectors and instead be screened by body scanning machines that look through clothing for hidden weapons, the Transportation Security Administration said Tuesday. An experimental program that begins today at Tulsa International Airport will test whether the $170,000 [...]

New exploit targets IE 7 hole patched last week

New exploit targets IE 7 hole patched last week

Cybercriminals are exploiting a critical hole in Internet Explorer 7 that was patched a week ago by Microsoft, security firm Trend Micro warned on Tuesday. The malicious code, which Trend Micro named "XML_DLOADR.A," is hidden in a Word document. On unpatched systems, when the file is opened an ActiveX object automatically accesses a Web site to [...]

Blackjack card-counting iPhone app is illegal in Las Vegas

Blackjack card-counting iPhone app is illegal in Las Vegas

Mark Milian of the LA Times reports on an iPhone application called A Blackjack Card Counter that has pit bosses in Vegas looking for people who keep their hands in their pockets. The $3.99 app has a feature, called stealth mode, that allows the user to easily operate the card counter with the phone concealed in a pocket. Simply press the right [...]

Debian “Lenny” ready for the masses?

Debian “Lenny” ready for the masses?

The venerable Debian Linux distribution has experienced a significant new release with its latest update, dubbed Lenny. While Debian is still not the easiest Linux distro to install and use, Lenny makes significant leaps forward and remains one of the most powerful Linux options. Many Linux newcomers stick with popular distros like Ubuntu or [...]

BackTrack 4 beta released

BackTrack 4 beta released

The Remote Exploit Development Team has just announced BackTrack 4 Beta. BackTrack is a Linux based LiveCD intended for security testing and we’ve been watching the project since the very early days. They say this new beta is both stable and usable. They’ve moved towards behaving like an actual distribution: it’s based on Debian core, they [...]

MIME sniffing in Internet Explorer enables cross-site scripting attacks

MIME sniffing in Internet Explorer enables cross-site scripting attacks

Many large sites make special efforts to protect their visitors against possible JavaScript attacks, by, for example, implementing special filters that guard against active content, although most of them can't switch off their own active content – such as JavaScript, HTML code and Flash applets in profiles, blogs and forums. Most interactive [...]

HOWTO: Write a Linux virus in five easy steps

HOWTO: Write a Linux virus in five easy steps

There is this rumor going around that Linux is virus free. It is said that the old-fashioned multi-user heritage of Linux (and other *nix OSs) prevents malware, since users are not normally running their programs in admin mode (as root user). We are reminded that execute bits are needed to run anything – contrary to Windows – and that execute [...]

Trojan Virus effects thousands of pirated copies of Apple’s iWork ’09 Suite

Trojan Virus effects thousands of pirated copies of Apple’s iWork ’09 Suite

Malware masquerading as part of Apple’s iWork ‘09 suite has targeted unsuspecting Mac users foolish enough to illegally download and install the pirated version of the software commonly found on warez sites around the Web. Once downloaded and installed, the trojan named OSX.Trojan.iServices.A has unrestrained root access, which it [...]

Bobbie teaches you about SSH tunnels

Here’s a quick video covering some of the pitfalls you may encounter when setting up SSH tunnels.

Microsoft is giving cops free COFEE

Microsoft is giving cops free COFEE

This (old) article is making it's rounds on the news aggregator sites again; but since no one actually wants to RTFA: COFEE is designed for saving any data from a LIVE system. A suspect is sitting at his computer when the cops bust in. They can use this to save whatever he was doing, since it'll probably be lost when the computer is shut down and [...]

All your passports are belong to us

Think of it this way: Chris Paget just did you a service by hacking your passport and stealing your identity. Using a $250 Motorola RFID reader and antenna connected to his laptop, Chris recently drove around San Francisco reading RFID tags from passports, driver licenses, and other identity documents. In just 20 minutes, he found and cloned the [...]

PETA’s Seakittens website “hacked”

PETA’s Seakittens website “hacked”

@ Omaha Steaks. Seakittens.com

 Page 7 of 14  « First  ... « 5  6  7  8  9 » ...  Last »