Debian and Ubuntu keys under attack

Friday, May 16th, 2008

A recently disclosed vulnerability in widely used Linux distributions can be exploited by attackers to guess cryptographic keys, possibly leading to the forgery of digital signatures and theft of confidential information, a noted security researcher said Thursday. HD Moore, best known as the exploit researcher who created the Metasploit penetration testing ...

Top 10 Popular Passwords

Thursday, May 15th, 2008

If you want to be stylish and liked, go with what’s popular. But if you want security, using the most popular passwords are a sure way to leave hackers an easy way into your accounts. Apparently, a whopping 20% of people use some variant of the following 10 password choices, ...

Hacker writes rootkit for Cisco’s routers

Thursday, May 15th, 2008

A security researcher has developed malicious rootkit software for Cisco's routers, a development that has placed increasing scrutiny on the routers that carry the majority of the Internet's traffic. Sebastian Muniz, a researcher with Core Security Technologies, developed the software, which he will unveil on May 22 at the ...

Hackers Find a New Place to Hide Rootkits

Saturday, May 10th, 2008

Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's microprocessor, hidden from current antivirus products. Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...

Top Six Database Attacks

Thursday, May 8th, 2008

It takes the average attacker less than 10 seconds to hack in and out of a database -- hardly enough time for the database administrator even notice the intruder. So it’s no surprise that many database attacks go unnoticed by organizations until long after the data has been compromised. And surprisingly, ...