Friday, July 31st, 2009
A pair of computer security researchers have discovered a BIOS vulnerability caused by the Computrace Laptop Lojack software, serving as a rootkit to potentially let malware nest and thrive in an estimated 60% of newish laptops.
The research team of Alfredo Ortega and Anibal Sacco say that when malware infects a ...
Posted in Hardware, Privacy, Security, Software | No Comments
Thursday, July 30th, 2009
A ferocious piece of malware that's infected up to a million PCs is stealing a "tremendous" amount of financial information from consumers and businesses that log on to their bank, stock broker, credit card, insurance, job hunting and favorite e-shopping sites, a noted botnet researcher said today.
"Clampi is the most ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, June 30th, 2009
VirtualBox is a family of powerful x86 virtualization products for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Tuesday, June 30th, 2009
Firefox 3.5 is based on the Gecko 1.9.1 rendering platform, which has been under development for the past year. Firefox 3.5 offers many changes over the previous version, supporting new web technologies, improving performance and ease of use.
Some of the notable features are:
Support for the HTML5 <video> and <audio> ...
Posted in Internet, Privacy, Security, Software | No Comments
Monday, June 22nd, 2009
I was contacted privately about this, so I thought I would post a step-by-step guide on how to capture keystrokes from a target machine using Metasploit.
Instead of posting a ton of screenshots, I will provide the commands in text below, step-by-step:
msf > use exploit/windows/smb/ms08_067_netapi (only an example - use whatever ...
Posted in Privacy, Security | 4 Comments