Monday, May 5th, 2008
Researchers have discovered a new, complex spam attack that uses a sophisticated ruse to fool users into downloading malware.
The exploit, which researchers at BitDefender call "a spam-sending scheme of Byzantine complexity," features spam messages that claim to contain links to videos. When users try to click and see the video, ...
Posted in Internet, Privacy, Security | No Comments
Monday, May 5th, 2008
House of Hackers is an exclusive, hacker community network. The House of Hackers community is established to support the hacker culture, mindset, way of life, ideologies, political views, vision, etc.
Members of the community are able to exchange ideas with each other, communicate, form groups, elite circles and tiger/red teams, conglomerate ...
Posted in General BS, Privacy, Security | No Comments
Monday, May 5th, 2008
Nowadays, who understands Di-Di-Di-Da-Da-Da-Di-Di-Dit (S.O.S., Save Our Souls)? Few people do, but your web browser just might. In his blog, security expert Nathan McFeters has reported the discovery of a cross-site scripting (XSS) vulnerability on an Italian website that allows attackers to inject malicious JavaScript encoded in Morse code in ...
Posted in Coding, Internet, Privacy, Security | No Comments
Monday, May 5th, 2008
If you think of flash memory, people typically think of USB memory sticks or memory cards for digital cameras and camcorders. But the potential applications for flash have expanded tremendously. The media started off as non-volatile memory for firmware on PCs and consumer electronics devices. It then became an ultra-portable ...
Posted in Hardware, Privacy, Security | No Comments
Monday, May 5th, 2008
This is a pretty new tool and a very cool one, Hibernation is a fairly new feature for Windows so it’s good to see a new tool targeting that.
Microsoft provides a feature called Hibernation also know as suspend to disk that aims to save the system state into an undocumented ...
Posted in Privacy, Security, Windows | No Comments