Steganography with TCP retransmissions

Friday, May 29th, 2009

Polish researchers have described a way of hiding information in retransmissions of IP-based data traffic. Transmission errors are simulated in a TCP connection to provoke retransmissions and, before packets are retransmitted, their content is replaced with data intended to be concealed. With the steganographic protocol known to both sender and receiver, ...

Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution

Thursday, May 28th, 2009

Microsoft is investigating new public reports of a new vulnerability in Microsoft DirectX. The vulnerability could allow remote code execution if user opened a specially crafted QuickTime media file. Microsoft is aware of limited, active attacks that use this exploit code. While our investigation is ongoing, our investigation so far ...

L0phtCrack 6 Released

Wednesday, May 27th, 2009

L0phtCrack 6 is packed with powerful features such as scheduling, hash extraction from 64 bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding. Yet it is still the easiest to use password auditing and recovery software available. Password Scoring L0phtCrack 6 provides a scoring metric to quickly assess password quality. Passwords ...

Malwarebytes’ Anti-Malware 1.37 Released

Wednesday, May 27th, 2009

Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. In our product we have compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well known ...

TwitterCut – Twitter’s Newest Phishing Scam

Wednesday, May 27th, 2009

If you see some tweets in your stream that say: “OMG I just got over 1000 followers today from http://twittercut.com” — don’t be fooled, it’s a scam.  The link takes you to a website that will prompt you for your Twitter login information.  Once it has stolen your credentials, it ...