Tuesday, May 27th, 2008
Last Thursday at the EUSecwest conference, security researcher Sebastian Muniz of Core Security Technologies demonstrated a proof-of-concept rootkit for Cisco's IOS router operating system.A root kit consists of one or several related applications designed to give the program user root or administrator privileges on a given computer, whether or not ...
Posted in Hardware, Networking, Security | No Comments
Saturday, May 24th, 2008
We’re proud to announce: Ad-Aware 2008 Free, Plus, and Pro versions are now available.
While we continue to offer a full-powered anti-spyware solution that is free of charge for personal home use, with this new release, there’s more reason than ever to boost your defenses with our Plus or Pro products. ...
Posted in General BS, Internet, Privacy, Security | No Comments
Saturday, May 24th, 2008
Love or hate its nagging prompts, Vista's Account Control feature (UAC) has a security feature that marks it out from any other type of Windows security programme -- it can spot rootkits before they install.
This is one finding buried in a report published in two German computer ...
Posted in Internet, Networking, Privacy, Security, Windows | 1 Comment
Thursday, May 22nd, 2008
Google is now sharing details on why its automatic search deems certain Websites risky.
The search giant this month quietly added a new, free service called the Safe Browsing Diagnostic Page that tells whether a site flagged by Google as potentially dangerous is hosting malware, or helps distribute malware, for ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, May 20th, 2008
You don’t have to take an ax to a piece of hardware to perform a so-called permanent denial-of-service (PDOS) attack. A researcher this week will demonstrate a PDOS attack that can take place remotely.
A PDOS attack damages a system so badly that it requires replacement or reinstallation of hardware. Unlike ...
Posted in Coding, Hardware, Internet, Networking, Privacy, Security | No Comments