Thursday, June 26th, 2008
An unpatched cross-domain vulnerability in Microsoft’s flagship Internet Explorer browser could expose Windows users to cookie hijacks and credentials theft attacks, according to a warning from security researchers.
The zero-day flaw, which has been reported to Microsoft, is a variation of Eduardo Vela’s IE Ghost Busters talk:
Do you believe in ghosts? ...
Posted in Coding, Internet, Privacy, Security, Windows | No Comments
Thursday, June 26th, 2008
Yahoo has fixed a vulnerability that could allow a hacker to get access to a person's webmail account.
The problem was in the way Yahoo's mail interacts with version 8.1.0.209 of its IM application, according to web application security company Cenzic.
Cenzic notified Yahoo of the problem in May, and the company ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Wednesday, June 25th, 2008
VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties. It incorporates a fuzzing suite built on the Sulley fuzzing framework, a SIP torturer tool based on RFC 4475 and a variety of auxilliary modules to ...
Posted in Internet, Networking, Privacy, Security | No Comments
Tuesday, June 24th, 2008
Worried about someone breaking into your house in your absence? Or just need to keep a tab on who enters your room while you are away? Well, all you need is a webcam, a linux PC/laptop and a twitter account. And you are set for real time updates through twitter ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Tuesday, June 24th, 2008
The MSRC released an advisory today that discusses the recent SQL injection attacks and announces three new tools to help identify and block these types of vulnerabilities. The advisory discusses the new tools, the purpose of each, and the way each complements the others. The goal of this blog post is ...
Posted in Coding, Internet, Security, Software | No Comments