Duplicating keys from a photograph

Monday, November 17th, 2008

Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine. Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...

Vulnerability discovered in SSH specification

Monday, November 17th, 2008

According to the UK-based Centre for the Protection of National Infrastructure (CPNI), an error in the secure shell protocol (SSH) specification can in rare cases be exploited to reconstruct part of the plain text. According to their description of the error, the standard OpenSSH configuration allows 32 bits of plain ...

FBI Notification – Another Email Scam

Friday, November 14th, 2008

I received another email today supposedly from an FBI Director claiming that I am the beneficiary for a $10.5 million sum.  Basically, it's the newer version of the old Nigeria scam.  Here are the exact email contents, including the basic headers: -----Original Message----- From: Federal Bureau of Investigation [mailto:[email protected]] Sent: Friday, November 14, ...

Antivirus 2009: How to Remove Fake AV Software

Thursday, November 13th, 2008

A new threat that comes under the guise of a genuine antivirus program has become increasingly prevalent over the past year. Offering to locate and remove malware from your PC, this rogue will actually install a Trojan on your unsuspecting system. The process is usually initiated when you click a ...

Firefox 3.0.4 closes nine security holes

Thursday, November 13th, 2008

The Mozilla Foundation has released Firefox version 3.0.4 to close nine security holes. The developers rated four of the holes as critical because they allow attackers to execute arbitrary code on the victim's system. One of the critical holes is a classical buffer overflow that can be triggered via specially ...