Thursday, May 15th, 2008
A security researcher has developed malicious rootkit software for Cisco's routers, a development that has placed increasing scrutiny on the routers that carry the majority of the Internet's traffic.
Sebastian Muniz, a researcher with Core Security Technologies, developed the software, which he will unveil on May 22 at the ...
Posted in Hardware, Internet, Networking, Security, Software | No Comments
Wednesday, May 14th, 2008
Over the weekend, a number of network administrators issued warnings over an order-of-magnitude increase in the number of attempts to guess the username and password of systems running secure shell (SSH), the encrypted access method that replaced the common telnet service. System administrators at universities and some companies have reported ...
Posted in Internet, Linux, Networking, Security, Software | No Comments
Wednesday, May 14th, 2008
A little-known botnet has put a different spin on the recent wave of SQL injection attacks on thousands of Websites: It’s outfitting its bots with its own tool to launch SQL injection attacks on vulnerable sites.
The Asprox botnet, a relatively small botnet known mainly for sending phishing emails, has been ...
Posted in Coding, Internet, Privacy, Security | No Comments
Wednesday, May 14th, 2008
The Ubuntu Unleashed blog has an excellent guide to the ins and outs of the Uncomplicated Firewall (ufw), a new feature in Ubuntu Linux 8.04, or Hardy Heron, that makes it easy to control the traffic into and out of your system. While turning on the firewall is as simple ...
Posted in Internet, Linux, Privacy, Security | No Comments
Wednesday, May 14th, 2008
Most of todays tools for fingerprinting are focusing on server-side services. Well-known and widely-accepted implementations of such utilities are available for http web services, smtp mail server, ftp servers and even telnet daemons. Of course, many attack scenarios are focusing on server-side attacks.
Client-based attacks, especially targeting web clients, are becoming ...
Posted in Internet, Privacy, Security, Software | No Comments