Wednesday, July 16th, 2008
Crafted Portable Document Format files can allow an attacker to gain control of a BlackBerry server. According to a security advisory from BlackBerry vendor RIM, the bug is in the PDF Distiller component of the Attachment Service, which runs on the server and prepares PDF email attachments for display on ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Wednesday, July 16th, 2008
For the last decade, as wireless networks have grown in popularity, so has the number of hot spots around the globe.
The leading online hot-spot directory, JiWire, lists 215,666 locations as of this writing. Those are just the ones people bother to report. Believe it or not, they're not all in ...
Posted in Internet, Linux, Networking, Privacy, Security, Windows | No Comments
Wednesday, July 16th, 2008
The Registry Editor will not allow you to navigate through HKEY_LOCAL_MACHINE\SAM and HKEY_LOCAL_MACHINE\SECURITY hives. These hives are protected by the System Account and currently logged on user or member of Administrators Group do not have permissions to view them.
To view the the registry entries under SAM or SECURITY hive, you ...
Posted in Privacy, Security, Windows | No Comments
Tuesday, July 15th, 2008
Reformed hacker-turned-security-consultant Kevin Mitnick served five years in federal prison for breaking into phone and software company networks. He talks about his past hacking exploits, computer security, and how he turned an illegal hobby into a useful career.
Source:
http://www.pcworld.com/businesscenter/article/148430/five_things_kevin_mitnick_knows_about_security.html
Posted in Internet, Privacy, Security | No Comments
Tuesday, July 15th, 2008
Ever wondered what name is behind some obscure gmail address? Maybe your preferred gmail address was taken and you’re wondering who took it?
Here’s a cute vulnerability in the gmail system that comes from the strong tie-ins between gmail, the google calendar and all the other services.
Source:
http://blogs.securiteam.com/index.php/archives/1113
Posted in Internet, Privacy, Security, Software | No Comments