Thursday, July 24th, 2008
MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. It’s included as part of the OSWA Assistant LiveCD we mentioned quite recently.’
I wanted to mention this tool separately as I think it’s very cool!
MoocherHunter™ identifies the location of an 802.11-based wireless moocher ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Wednesday, July 23rd, 2008
Security researcher Aviv Raff said on Wednesday that the iPhone's Mail and Safari applications are prone to URL spoofing and could allow phishing attacks against iPhone users.The alert was anticipated. Prior to the release of the iPhone on July 11, Raff was one of a few security researchers who indicated ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, July 23rd, 2008
One day after a security company accidentally posted details of a serious flaw in the Internet's Domain Name System (DNS), hackers are saying that software that exploits this flaw is sure to pop up soon.Several hackers are almost certainly already developing attack code for the bug, and it will most ...
Posted in Internet, Linux, Security, Software, Windows | No Comments
Wednesday, July 23rd, 2008
SSH is the secure shell, a standard defined in RFC 4251. It is a network protocol that opens up a secure channel between two devices using TCP port 22. This channel can also be used for SFTP and SCP (secure FTP and secure copy, respectively). To make this work, you ...
Posted in Internet, Linux, Networking, Privacy, Security, Windows | 1 Comment
Tuesday, July 22nd, 2008
Phishers are doing their homework. The conventional way is to ask users to update their accounts by asking them to click a certain link. A phishing email usually displays legitimate URL or a hyperlink. Upon clicking, the user will be redirected to the phishing Web site.
But now, there’s no URL ...
Posted in Internet, Privacy, Security | No Comments