Reading EXIF data with Javascript

Sunday, May 11th, 2008

Inspired by a comment on Ajaxian, I killed another afternoon or two making a small library capable of reading EXIF data from JPEG images, figuring I would at least learn a bit about EXIF and the JPEG (and TIFF) image formats. Before we start, a small disclaimer. I'm somewhat of a ...

Gmail as a spam engine

Sunday, May 11th, 2008

This is not good. Researchers from INSERT found a vulnerability in the Gmail engine that could allow spammers to forward mail through Google, thereby bypassing blacklists and being accepted by whitelists. It works by using the same forwarding features that allow users, myself included, to forward their email through ...

Hackers Find a New Place to Hide Rootkits

Saturday, May 10th, 2008

Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's microprocessor, hidden from current antivirus products. Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...

Phishing Campaign Targets Tax Rebate Checks

Friday, May 9th, 2008

The Internet Crime Complaint Center (IC3) on Thursday issued a warning about a phishing campaign designed to steal personal information from consumers using the promise of a tax rebate check as bait.IC3 is jointly run by the Federal Bureau of Investigation, the National White Collar Crime Center, and the Bureau ...

Windows Vista More Vulnerable To Malware Than Windows 2000

Thursday, May 8th, 2008

Microsoft's Vista operating system is more susceptible to malware than Windows 2000, and though it's 37% more secure than Windows XP, it's still too vulnerable.That's the contention of security vendor PC Tools, which has a financial interest in the vulnerability of Microsoft's software. "Ironically, the new operating system has been hailed ...