Top 10 Popular Passwords

Thursday, May 15th, 2008

If you want to be stylish and liked, go with what’s popular. But if you want security, using the most popular passwords are a sure way to leave hackers an easy way into your accounts. Apparently, a whopping 20% of people use some variant of the following 10 password choices, ...

Bots Use SQL Injection Tool in New Web Attack

Wednesday, May 14th, 2008

A little-known botnet has put a different spin on the recent wave of SQL injection attacks on thousands of Websites: It’s outfitting its bots with its own tool to launch SQL injection attacks on vulnerable sites. The Asprox botnet, a relatively small botnet known mainly for sending phishing emails, has been ...

Get More from Ubuntu’s Uncomplicated Firewall

Wednesday, May 14th, 2008

The Ubuntu Unleashed blog has an excellent guide to the ins and outs of the Uncomplicated Firewall (ufw), a new feature in Ubuntu Linux 8.04, or Hardy Heron, that makes it easy to control the traffic into and out of your system. While turning on the firewall is as simple ...

browserrecon – Passive Browser Fingerprinting

Wednesday, May 14th, 2008

Most of todays tools for fingerprinting are focusing on server-side services. Well-known and widely-accepted implementations of such utilities are available for http web services, smtp mail server, ftp servers and even telnet daemons. Of course, many attack scenarios are focusing on server-side attacks. Client-based attacks, especially targeting web clients, are becoming ...

New Tests Show Rootkits Still Evade AV

Tuesday, May 13th, 2008

Rootkits are still a security scanner’s worst nightmare: New rootkit detection tests recently conducted by AV-Test.org found that security suites and online Web scanners detected overall only a little more than half of rootkits. AV-Test.org, an indie security test organization based in Germany, ran two rootkit tests last month, one on ...