Thursday, June 11th, 2009
Australian researchers have described a new and faster way of provoking collisions of the SHA-1 hash algorithm. With their method, a collision can be found using only 252 attempts. This makes practical attacks feasible and could have an impact on the medium-term use of the algorithm in digital signatures.
SHA-1 is ...
Posted in Coding, Internet, Privacy, Security | 1 Comment
Thursday, June 11th, 2009
We have the great pleasure to release today another excellent selection of the best Hacking articles this year. An issue full of new exploitation techniques and ground work on writing attack software.
This issue has some evil number.. with a lot of evil content. Phrack proves once more how we can, ...
Posted in Coding, Linux, Privacy, Security, Windows | No Comments
Monday, June 1st, 2009
Apple has released versions 8.2 of iTunes and 7.6.2 of QuickTime to address a series of vulnerabilities, mostly in QuickTime.
The one iTunes vulnerability is a stack overflow in parsing "itms:" URLs which can lead to a DOS or arbitrary code execution. 10 vulnerabilities in QuickTime are all of a type ...
Posted in Coding, Internet, Security, Software | No Comments
Tuesday, May 12th, 2009
Rapidly rising cyber crime and the growing prospect of the Internet being used as a medium for terrorist attacks pose a major challenge for IT security. Cryptography is central to this challenge, since it underpins privacy, confidentiality, and identity, which together provide the fabric for e-commerce and secure communications. Cryptography ...
Posted in Coding, Internet, Privacy, Security | No Comments
Wednesday, April 15th, 2009
Kernel rootkits are tough enough to detect, but now a researcher has demonstrated an even sneakier method of hacking Linux.
The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware ...
Posted in Coding, Linux, Privacy, Security | No Comments