Thursday, July 24th, 2008
Metasploit, the information security research and hack tool kit, created by HD Moore, has released exploit code targeting the DNS Cache Poisoning Flaw, recently revealed by Dan Kaminsky, of DoxPara Research.
Evidently, reported at Wired’s ThreatLevel blog, the code can not be utilized to overwrite the domain name server cache data, ...
Posted in Internet, Networking, Privacy, Security | No Comments
Thursday, July 24th, 2008
MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. It’s included as part of the OSWA Assistant LiveCD we mentioned quite recently.’
I wanted to mention this tool separately as I think it’s very cool!
MoocherHunter™ identifies the location of an 802.11-based wireless moocher ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Wednesday, July 23rd, 2008
Security researcher Aviv Raff said on Wednesday that the iPhone's Mail and Safari applications are prone to URL spoofing and could allow phishing attacks against iPhone users.The alert was anticipated. Prior to the release of the iPhone on July 11, Raff was one of a few security researchers who indicated ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, July 23rd, 2008
SSH is the secure shell, a standard defined in RFC 4251. It is a network protocol that opens up a secure channel between two devices using TCP port 22. This channel can also be used for SFTP and SCP (secure FTP and secure copy, respectively). To make this work, you ...
Posted in Internet, Linux, Networking, Privacy, Security, Windows | 1 Comment
Tuesday, July 22nd, 2008
Phishers are doing their homework. The conventional way is to ask users to update their accounts by asking them to click a certain link. A phishing email usually displays legitimate URL or a hyperlink. Upon clicking, the user will be redirected to the phishing Web site.
But now, there’s no URL ...
Posted in Internet, Privacy, Security | No Comments