Wednesday, April 2nd, 2008
A British security researcher has demonstrated a "biologging" system for intercepting biometric authentication data, warning that attacks on biometric systems could become relatively straightforward if current practices don't change.
Matthew Lewis, of London-based Information Risk Management, demonstrated a proof-of-concept biologger last week at Black Hat Amsterdam and released the tool's source ...
Posted in Hardware, Privacy, Security | No Comments
Sunday, March 30th, 2008
Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor.
Among other activities, MarkMonitor tracks phishing attacks that target brand names.
Researchers compiled a list of 750 Google search terms that are used to track down ...
Posted in Internet, Privacy, Security | No Comments
Friday, March 28th, 2008
The purpose of this article is to help people without advanced computer knowledge to start white hacking and learn how to write more secure login web pages. When I started to learn about security, even though I searched really hard, I did not manage to find articles that would tell ...
Posted in Coding, Internet, Security, Software | No Comments
Tuesday, March 25th, 2008
You installed Firefox. How do you make it more secure for daily use? How do the Mozilla developers ensure that they are doing all the right things? How do you safely browse the Internet?
These are not easy questions to answer, and some of the answers will be system/OS-dependent.
Security functionality in ...
Posted in Internet, Linux, Privacy, Security, Software, Windows | No Comments
Monday, March 24th, 2008
Exploit-Me is a suite of Firefox web application security testing tools. Exploit-Me tools are designed to be lightweight and easy to use. Instead of using a proxy like many web application testing tools, Exploit-Me integrates directly with Firefox. It currently consists of two tools, one for XSS and one for ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments