Web 2.0 Sites a Thriving Marketplace for Malware

Friday, May 30th, 2008

A wiry young man with his head shaved and wearing a tank top points a handgun straight at the camera in a disturbing YouTube video. The man wears what appears to be a wedding ring, and he gazes vacantly away from the viewer. Though it's an odd image for an advertisement, ...

CSS exploit allows detection of social site use

Thursday, May 29th, 2008

Web developer Aza Raskin knows we visit Digg, Del.icio.us, Reddit and Facebook without even having to ask. No, he isn't employing privacy violating hackery, but he is exploiting a "cute" information leak in CSS that traditionally displays visited links differently than those that have yet to be visited. By loading in ...

Built-in Windows Command-Line Security Tools

Wednesday, May 28th, 2008

Links: Built-in Windows commands to determine if a system has been hacked More built-in Windows commands for system analysis

New SQL Injection Attacks Exploit Adobe Flash Flaw

Wednesday, May 28th, 2008

Mass SQL injection attack, take four: Yet another wave of SQL injection attacks is exploiting an Adobe Flash vulnerability that appears to be coming from the same series of attacks originating from China. The intent, as in previous attacks, has been to steal online gamers’ password credentials. But given the persistence ...

When To Layer Encryption

Wednesday, May 28th, 2008

I used to joke about the client that once told me their management mandated “double encryption” on all financial information after a breach. In their case, they were encrypting their database and backup tapes. Not that there isn’t a valid reason to encrypt databases and backup tapes, but the way ...