Sunday, March 30th, 2008
"I'm proud to announce the release of Wireshark 1.0. This is the culmination of nearly ten years of hard work by a team of brilliant and talented developers. It is an honor to be able to work with these people.
On behalf of the development team, I would like to thank ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Sunday, March 30th, 2008
Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor.
Among other activities, MarkMonitor tracks phishing attacks that target brand names.
Researchers compiled a list of 750 Google search terms that are used to track down ...
Posted in Internet, Privacy, Security | No Comments
Sunday, March 30th, 2008
When you are doing a Business Impact Analysis or a Risk Assessment, you will often find that email, be it internal or external, is one of the systems that people think they cannot live without. They might even be right. Email systems are being used as communications tool, storage system, ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 29th, 2008
I found a great write-up over at SANS that goes over session hijacking in amazing detail. Click the link below to read the full 49-page white paper.
Session Hijacking in Windows Networks
Posted in Coding, Internet, Networking, Privacy, Security, Windows | No Comments
Friday, March 28th, 2008
Last week's massive IFRAME injection attack is slowly turning into a what looks like a large scale web application vulnerabilities audit of high profile sites. Following the timely news coverage, Symantec's rating for the attack as medium risk, StopBadware commenting on XP Antivirus 2008, and US-CERT issuing a warning about ...
Posted in Coding, Internet, Privacy, Security | No Comments