The Twitter Hall of Shame: 50 Tweets That Will Echo in History

Thursday, June 19th, 2008

Twitter is a fun Web 2.0 communications tool that allows users to deliver quick messages of 140 characters or less. The hastiness and ephemeral nature of these messages means that Twitter has become more than a communication tool — it's a source of angry, funny and awkward messages that would ...

Firefox 3 suffers its first vulnerability

Wednesday, June 18th, 2008

Less than one day after its launch, Firefox 3 has a vulnerability. According to Tipping Point's Zero Day Initiative, the vulnerability, which it rates as critical, was reported within the first five hours of Firefox 3's release. "Once the vulnerability was verified in TippingPoint's DVLabs and acquired from the researcher, the vulnerability ...

The Extended HTML Form attack revisited

Wednesday, June 18th, 2008

"HTML forms (i.e. <form>) are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has no way of identifying between an HTTP server and one that is not an ...

IP traffic to ‘double’ every two years

Wednesday, June 18th, 2008

Web traffic volumes will almost double every two years from 2007 to 2012, driven by video and web 2.0 applications, according to a report from Cisco Systems. Increased use of video and social networking has created what Cisco calls 'visual networking', which is raising traffic volumes at a compound annual growth ...

Internet-connected coffee maker has security holes

Tuesday, June 17th, 2008

An Australian man has discovered security vulnerabilities in his Internet-connected coffee maker that could allow a remote attacker to not only take over his Windows XP-based PC but also make his coffee too weak. Craig Wright, a risk advisory services manager at professional services firm BDO, found several security holes, including ...