Wednesday, May 7th, 2008
RedTacton is a new Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path.
Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 Mbps.
RedTacton uses the minute ...
Posted in General BS, Networking, Privacy, Security | No Comments
Wednesday, May 7th, 2008
A loyal ISC reader, Rob, wrote in to point us at what looks to be a SQL Injection worm that is on the loose. From a quick google search it shows that there are about 4,000 websites infected and that this worm started at least mid-April if not earlier. Right ...
Posted in Coding, Internet, Privacy, Security | No Comments
Tuesday, May 6th, 2008
Adware pushers have found a new way to trick you into downloading their annoying products: fake MP3 files.
On Tuesday, security vendor McAfee reported that it's seen a huge spike in fake MP3 files spreading on peer-to-peer networks. Although the files have names that make them look like audio recordings, they're ...
Posted in Privacy, Security | No Comments
Tuesday, May 6th, 2008
Tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing.
The tool is somewhat related to delta, which is a more featured general purpose optimizer but is meant specifically for dealing with unknown or complex data formats (without the need ...
Posted in Coding, Privacy, Security | No Comments
Tuesday, May 6th, 2008
You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage?
A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they ...
Posted in Hardware, Privacy, Security | No Comments