Sunday, June 29th, 2008
A 19-year-old hacker is agreeing to plead guilty to masterminding a botnet to obtain thousands of victims' personal data in an anonymous scheme a federal cybercrime official described Friday as the nation's first such attack in which peer-to-peer software was the "infection point."The defendant, Jason Michael Milmont, launched the assault ...
Posted in Internet, Networking, Privacy, Security | No Comments
Sunday, June 29th, 2008
In an update to our June 20th post referring to Grisoft’s AVG anti-virus product spewing fake traffic (in our opinion a flawed architecture design by the company’s CTO, Karel Obluk). Cade Metz, of The Register, has delved a bit deeper into the issue, and has discovered that over last weekend, ...
Posted in Internet, Privacy, Security | No Comments
Sunday, June 29th, 2008
Plenty of USB storage keys are on the market, but Ironkey is the first to use military level encryption. Sold in 1GB, 2GB, and 4GB sizes, the key features a processor called the Cryptochip, which uses Public Key Cryptography ciphers linked to an online account to create encryption keys on ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Thursday, June 26th, 2008
A couple of minutes ago an interesting attempt to phish for Google account credentials made it to my inbox. It had me blink my eyes because while I suspected phishing there were some things with this one that had me check twice to see how it’s done, as things looked ...
Posted in Internet, Privacy, Security, Software | No Comments
Thursday, June 26th, 2008
An unpatched cross-domain vulnerability in Microsoft’s flagship Internet Explorer browser could expose Windows users to cookie hijacks and credentials theft attacks, according to a warning from security researchers.
The zero-day flaw, which has been reported to Microsoft, is a variation of Eduardo Vela’s IE Ghost Busters talk:
Do you believe in ghosts? ...
Posted in Coding, Internet, Privacy, Security, Windows | No Comments