Researcher reveals Twitter ‘follow’ bug

Friday, August 1st, 2008

Attackers can exploit a bug in Twitter to force victims to follow the hacker's account, a security researcher said Thursday.According to Aviv Raff, the Twitter vulnerably could expose users to malware-hosting Web sites. "It can force people to follow you, which means all your twits will be showed in their ...

Hacking Without Exploits

Tuesday, July 29th, 2008

Cybercriminals increasingly are employing no-tech or low-tech techniques for making big money online -- no exploits or sophisticated hacker tools required.The techniques themselves aren’t new -- some have been around for nearly a decade. But the Web model has made these schemes that capitalize on so-called business logic flaws more ...

Metasploit Releases DNS Explot Code

Thursday, July 24th, 2008

Metasploit, the information security research and hack tool kit, created by HD Moore, has released exploit code targeting the DNS Cache Poisoning Flaw, recently revealed by Dan Kaminsky, of DoxPara Research. Evidently, reported at Wired’s ThreatLevel blog, the code can not be utilized to overwrite the domain name server cache data, ...

Zodiac – DNS Protocol Monitoring and Spoofing Tool

Friday, July 18th, 2008

Zodiac is a DNS protocol analyzation and exploitation program. It is a robust tool to explore the DNS protocol. Internally it contains advanced DNS routines for DNS packet construction and disassembling and is the optimal tool if you just want to try something out without undergoing the hassle to rewrite ...

BlackBerry PDF flaw exposes corporate networks

Thursday, July 17th, 2008

A "high" severity flaw affecting how BlackBerry Enterprise Server (BES) opens PDF attachments could be used to compromise a corporate network. Research in Motion quietly disclosed the flaw last week but is yet to issue a patch. "This issue has been escalated internally to our development team. No resolution time frame ...