Monday, August 4th, 2008
JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, August 1st, 2008
A security expert who helped pioneer some of the research behind the recent cold-boot attack discovery by researchers at Princeton University will reveal next week at Black Hat USA the technical details of methods he developed for protecting an encrypted laptop from the hack.The software-based techniques defend against so-called cold ...
Posted in Hardware, Privacy, Security | No Comments
Friday, August 1st, 2008
Attackers can exploit a bug in Twitter to force victims to follow the hacker's account, a security researcher said Thursday.According to Aviv Raff, the Twitter vulnerably could expose users to malware-hosting Web sites. "It can force people to follow you, which means all your twits will be showed in their ...
Posted in Internet, Privacy, Security | No Comments
Friday, August 1st, 2008
SIPcrack is a suite for sniffing and cracking the digest authentication used in the SIP protocol.The tools offer support for pcap files, wordlists and many more to extract all needed information and bruteforce the passwords for the sniffed accounts.If you don’t have OpenSSL installed or encounter any building problems try ...
Posted in Internet, Privacy, Security | No Comments
Thursday, July 31st, 2008
This is a pretty old issue, but this is an interesting new implementation of an old idea. Using your browser history and by matching your browsing habits the site attempts to guess your gender with a weighting system according to the gender demographics for a list of fairly popular sites.It’s ...
Posted in Internet, Privacy, Security | No Comments