Saturday, March 8th, 2008
If you haven't changed the default password on your home router, do so now.
That's what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code.
For the attack to work, the bad guys ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
Internet Explorer is also susceptible to the attack but is less likely to be tricked because it does a more thorough job in checking to see where a log-in form is coming from before it automatically submits password and user information.A flaw in Firefox allows you to steal user information ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
While many systems administrators are turning to firewalls and routers to control content on port 80, HTTP (hypertext transfer protocol), as well as intrusion detection and prevention, attackers can use HTTP tunneling to bypass access control restrictions. Tunneling involves encapsulating traffic in HTTP headers; a tunneling program receives the HTTP ...
Posted in Security | No Comments
Saturday, March 8th, 2008
Cisco's Linksys WRT54G Wireless-G Broadband Router has a flaw that could allow an attacker to gain administrative privileges on vulnerable devices. Even if the remote administration feature on the device is turned off, the router serves the administration web page on ports 80 and 443, protected only by a weak ...
Posted in Security | No Comments