Internet-connected coffee maker has security holes

Tuesday, June 17th, 2008

An Australian man has discovered security vulnerabilities in his Internet-connected coffee maker that could allow a remote attacker to not only take over his Windows XP-based PC but also make his coffee too weak. Craig Wright, a risk advisory services manager at professional services firm BDO, found several security holes, including ...

Recovering from the Encryption Virus

Tuesday, June 17th, 2008

Kaspersky Lab has published advice on recovering files encrypted by the frightening Gpcode.ak virus, but there is a big catch -- users must not have turned off their PC first. A new variant of the malware struck last week, scrambling a variety of files on victims' PCs using a very strong ...

BackTrack: A penetration testers toolset

Tuesday, June 17th, 2008

There are few job titles as misleading as that of the "Penetration Tester." Sure, saying professional computer hacker would be more direct, but have you ever noticed how hackers seem to have a dirty mind? Why else would they want to go phreaking through backdoors? Anyway, in order for hackers to ...

Compression lets attackers tap VoIP calls

Tuesday, June 17th, 2008

A common compression technique can make internet telephone calls significantly more susceptible to bugging, according to recent research from Johns Hopkins University. Internet telephony has become widely used through consumer-centric applications such as Skype, and is becoming more common in enterprises. The new research suggests, however, that standard encryption and compression methods, ...

Security Bonuses for Vista Programmers

Monday, June 16th, 2008

In this era in which software, especially prominent software, must be presumed to be under attack, you need the best tools to defend yourself. Much has been made of security features built into Windows Vista, such as IE Protected Mode, which accrue to all users. However, programmers can easily gain ...