10 easy steps to secure your Linux machine

Wednesday, October 28th, 2009

Whether you use a single desktop or manage a lab full of servers, with the various threats we all face from hackers these days you simply have to make sure you're running a secure ship.Running Linux gives you some inherent protection from attack, but you still need to take adequate ...

Facebook Password Spam Conceals Malware Attack

Wednesday, October 28th, 2009

Researchers at several security firms have tied the Bredolab Trojan to a spam campaign targeting Facebook users.The malware is being blasted out by spammers in e-mails claiming to come from “The Facebook Team." Inside the e-mails is a message that the recipient's Facebook password has been changed. In order to ...

Scrawlr – Tool for finding SQL Injection

Wednesday, October 28th, 2009

Scrawlr, developed by the HP Web Security Research Group in coordination with the MSRC, is short for SQL Injector and Crawler. Scrawlr will crawl a website while simultaneously analyzing the parameters of each individual web page for SQL Injection vulnerabilities. Scrawlr is lightning fast and uses our intelligent engine technology ...

Mozilla fixes 16 flaws with Firefox 3.5.4

Wednesday, October 28th, 2009

Mozilla today patched 16 vulnerabilities in Firefox, 11 of them critical, as it updated the open-source browser to version 3.5.4.The 11 critical Firefox 3.5 vulnerabilities were located in a variety of components, including Web worker calls, the GIF color map parser, the string-to-number converter, a trio of third-party media libraries, ...

Reverse Hash Calculator

Monday, October 26th, 2009

This page doesn't use rainbow tables (yet), but a similar, simpler approach. It uses a database of a couple million pre-compiled hash values. The strings used come from various password databases, and should have a pretty good chance of "hitting" your value. There is an intentional delay in the ...