Thursday, June 26th, 2008
Yahoo has fixed a vulnerability that could allow a hacker to get access to a person's webmail account.
The problem was in the way Yahoo's mail interacts with version 8.1.0.209 of its IM application, according to web application security company Cenzic.
Cenzic notified Yahoo of the problem in May, and the company ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Wednesday, June 25th, 2008
VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties. It incorporates a fuzzing suite built on the Sulley fuzzing framework, a SIP torturer tool based on RFC 4475 and a variety of auxilliary modules to ...
Posted in Internet, Networking, Privacy, Security | No Comments
Tuesday, June 24th, 2008
Worried about someone breaking into your house in your absence? Or just need to keep a tab on who enters your room while you are away? Well, all you need is a webcam, a linux PC/laptop and a twitter account. And you are set for real time updates through twitter ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Monday, June 23rd, 2008
As I mentioned in my post on Cross Document Messaging, client side cross domain request is an important area of interest for AJAX developers looking for ways to avoid expensive server side proxying calls. While Cross Document Messaging is useful for allowing third party components or gadgets embedded in a ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Monday, June 23rd, 2008
Everyone knows that there's no such thing as 100% security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are.
Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security ...
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments