Saturday, September 6th, 2008
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into a botnet that launched denial-of-service attacks on a victim server in a demonstration.
"Social Network Web sites have the ideal properties to become attack platforms," according to a ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, September 2nd, 2008
Google’s shiny new Web browser is vulnerable to a carpet-bombing vulnerability that could expose Windows users to malicious hacker attacks.
Just hours after the release of Google Chrome, researcher Aviv Raff discovered that he could combine two vulnerabilities — a flaw in Apple Safari (WebKit) and a Java bug discussed at ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, August 28th, 2008
A pair of security researchers recently demonstrated that a theoretical attack possible against the internet’s most embedded infrastructure can, in fact, be very real.
The attack exploits normal behavior in the internet routing protocol BGP, which ISPs use to determine how best to route traffic destined for other parts of the ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Monday, August 25th, 2008
Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used in order to protect communication networks include firewalls, encryption and IDS (Intrusion Detection Systems). The strategy follows the classical security paradigm of "Protect, Detect and React.” In other words, try to protect the ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Sunday, August 10th, 2008
At the Black Hat conference in Las Vegas on Thursday, Eric Filiol, the head scientist at the French Army Signals Academy's Virology and Cryptology Lab, explained how to steal data from a computer without a network connection.Filiol demonstrated what he called the Windows Jingle Attack, a method for encoding a ...
Posted in General BS, Security, Windows | No Comments