Friday, August 1st, 2008
Attackers can exploit a bug in Twitter to force victims to follow the hacker's account, a security researcher said Thursday.According to Aviv Raff, the Twitter vulnerably could expose users to malware-hosting Web sites. "It can force people to follow you, which means all your twits will be showed in their ...
Posted in Internet, Privacy, Security | No Comments
Friday, August 1st, 2008
SIPcrack is a suite for sniffing and cracking the digest authentication used in the SIP protocol.The tools offer support for pcap files, wordlists and many more to extract all needed information and bruteforce the passwords for the sniffed accounts.If you don’t have OpenSSL installed or encounter any building problems try ...
Posted in Internet, Privacy, Security | No Comments
Thursday, July 31st, 2008
This is a pretty old issue, but this is an interesting new implementation of an old idea. Using your browser history and by matching your browsing habits the site attempts to guess your gender with a weighting system according to the gender demographics for a list of fairly popular sites.It’s ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, July 30th, 2008
Ok, we have a confirmed instance where the DNS cache poisoning vulnerability was used to compromise a DNS server belonging to AT&T. This PCWorld article covers the incident. The original article makes it sound as though the Metasploit site was 'owned' by this incident when really the issue was ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, July 30th, 2008
It’s déjà vu all over again. Whitelisting technology has enjoyed a resurgence of interest lately, with antivirus companies such as Symantec, McAfee, and Microsoft planning to add it to their blacklisting-based malware detection tools and some enterprises even dropping AV altogether in favor of whitelisting alone. All thanks to the ...
Posted in Internet, Privacy, Security, Software | No Comments