Researcher reveals Twitter ‘follow’ bug

Friday, August 1st, 2008

Attackers can exploit a bug in Twitter to force victims to follow the hacker's account, a security researcher said Thursday.According to Aviv Raff, the Twitter vulnerably could expose users to malware-hosting Web sites. "It can force people to follow you, which means all your twits will be showed in their ...

SIPcrack – SIP Login Dumper & Hash/Password Cracker

Friday, August 1st, 2008

SIPcrack is a suite for sniffing and cracking the digest authentication used in the SIP protocol.The tools offer support for pcap files, wordlists and many more to extract all needed information and bruteforce the passwords for the sniffed accounts.If you don’t have OpenSSL installed or encounter any building problems try ...

Site Guesses Your Gender via Browsing History

Thursday, July 31st, 2008

This is a pretty old issue, but this is an interesting new implementation of an old idea. Using your browser history and by matching your browsing habits the site attempts to guess your gender with a weighting system according to the gender demographics for a list of fairly popular sites.It’s ...

DNS Cache Poisoning Issue Update

Wednesday, July 30th, 2008

Ok, we have a confirmed instance where the DNS cache poisoning vulnerability was used to compromise a DNS server belonging to AT&T. This PCWorld article covers the incident. The original article makes it sound as though the Metasploit site was 'owned' by this incident when really the issue was ...

The Real Dirt on Whitelisting

Wednesday, July 30th, 2008

It’s déjà vu all over again. Whitelisting technology has enjoyed a resurgence of interest lately, with antivirus companies such as Symantec, McAfee, and Microsoft planning to add it to their blacklisting-based malware detection tools and some enterprises even dropping AV altogether in favor of whitelisting alone. All thanks to the ...