Friday, August 1st, 2008
A security expert who helped pioneer some of the research behind the recent cold-boot attack discovery by researchers at Princeton University will reveal next week at Black Hat USA the technical details of methods he developed for protecting an encrypted laptop from the hack.The software-based techniques defend against so-called cold ...
Posted in Hardware, Privacy, Security | No Comments
Friday, August 1st, 2008
Attackers can exploit a bug in Twitter to force victims to follow the hacker's account, a security researcher said Thursday.According to Aviv Raff, the Twitter vulnerably could expose users to malware-hosting Web sites. "It can force people to follow you, which means all your twits will be showed in their ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, July 30th, 2008
Ok, we have a confirmed instance where the DNS cache poisoning vulnerability was used to compromise a DNS server belonging to AT&T. This PCWorld article covers the incident. The original article makes it sound as though the Metasploit site was 'owned' by this incident when really the issue was ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, July 30th, 2008
It’s déjà vu all over again. Whitelisting technology has enjoyed a resurgence of interest lately, with antivirus companies such as Symantec, McAfee, and Microsoft planning to add it to their blacklisting-based malware detection tools and some enterprises even dropping AV altogether in favor of whitelisting alone. All thanks to the ...
Posted in Internet, Privacy, Security, Software | No Comments
Tuesday, July 29th, 2008
A recent study of Web browser installations showed that far too few are up to date with the latest security patches. And browsers aren't alone; as my dear old mum can attest, it can be hard to keep up with OS and application patches when all you want to do ...
Posted in Internet, Privacy, Security, Software | No Comments