Saturday, December 6th, 2008
Researchers have identified a new trojan that can tamper with a wide array of devices on a local network, an exploit that sends them to impostor websites even if they are hardened machines that are fully patched or run non-Windows operating systems.
The malware is a new variant of the DNSChanger, ...
Posted in Internet, Networking, Privacy, Security | No Comments
Tuesday, November 25th, 2008
The pre-release version 1.0.5 of Wireshark, the network protocol analyser (or "packet sniffer"), has eliminated a vulnerability that could make it crash. It is reported that the error occurs during the analysis of over-long SMTP requests to a server. When the final version 1.0.5 will appear is still unknown, but ...
Posted in Internet, Networking, Security, Software | No Comments
Tuesday, November 18th, 2008
According to a report by VoIPshield, a VoIP security service provider, Microsoft's Office Communications Server (OCS), Office Communicator and Windows Messenger contain vulnerabilities that can be exploited for Denial of Service attacks. The applications can be crashed using specially crafted packets.
VoIPshield does not want to release more detailed information until ...
Posted in Internet, Networking, Security, Windows | No Comments
Monday, November 17th, 2008
According to the UK-based Centre for the Protection of National Infrastructure (CPNI), an error in the secure shell protocol (SSH) specification can in rare cases be exploited to reconstruct part of the plain text. According to their description of the error, the standard OpenSSH configuration allows 32 bits of plain ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Friday, November 7th, 2008
Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments