Compression lets attackers tap VoIP calls

Tuesday, June 17th, 2008

A common compression technique can make internet telephone calls significantly more susceptible to bugging, according to recent research from Johns Hopkins University. Internet telephony has become widely used through consumer-centric applications such as Skype, and is becoming more common in enterprises. The new research suggests, however, that standard encryption and compression methods, ...

Nessus 3 Tutorial

Tuesday, June 10th, 2008

If you're looking for a vulnerability scanner, chances are you've come across a number of expensive commercial products and tools with long lists of features and benefits. Unfortunately, if you're in the same situation as most of us, you simply don't have the budget to implement fancy high-priced systems. You ...

Windows PHP Socket Hijack Toolset

Friday, June 6th, 2008

Due to a problem in the way Apache binds itself to port 80 on Windows machines allows the PHP environment running under Apache to gain access to the information being sent to port 80, which in turn can be leveraged to preform man-in-the-middle attacks. This problem is exploited by the PHP ...

What you need to know about HTTP Verb Tampering

Wednesday, June 4th, 2008

Recently Arshan Dabirsiaghi, Director of Research of Aspect Security, published a white paper entitled “Bypassing URL Authentication and Authorization with HTTP Verb Tampering”. Initially there was a lot of confusion about what exactly was being explained or claimed. Including, is it real? Is it novel? Is it dangerous? What is ...

How to Harden Your Mac

Wednesday, June 4th, 2008

If you're a quasi-sophisticated Mac user and have been looking for advice on how to better safeguard your machine from hackers or local prying eyes, look no further: Apple has released a massive, 240-page guide that describes various methods for securing the operating system. According to SecurityFocus.com, the manual includes an ...