Vulnerability in Google spreadsheets allows cookie stealing

Monday, April 14th, 2008

Security researcher Billy Rios has discovered a vulnerability in Google Spreadsheets which attackers can exploit using links to crafted tables to steal a user's cookie. According to Rios, the victim has to follow such a link in Internet Explorer. The stolen cookie can be used to access all Google services ...

Keep on Fuzzing!

Monday, April 14th, 2008

As you will have noticed we’ve posted quite a number of Fuzzing Tools built around different frameworks and in different languages..most for difference targets/purposes too. Fuzzing has definitely exploded in the last year or so as more people try and understand it and code tools to automate the process. There are ...

ActiveX is least secure plug-in

Monday, April 14th, 2008

ActiveX controls made up most of all browser plug-in vulnerabilities in the second half of 2007, according to Symantec. The company has just released its semi-annual web security report and in it said that Microsoft's technology, primarily used to create add-ins for Internet Explorer, accounted for 79 percent of the 239 ...

Disinfecting a virus-laden PC

Monday, April 14th, 2008

The first thing is to isolate the computer (no more trading floppies until you're done) and then begin to disinfect it. One of my favorite tools is Knoppix. The great thing about this Linux distribution is that you don't have to know anything about Linux in order to be able to ...

New Crimeware-as-a-Service Market Thriving

Sunday, April 13th, 2008

First it was do-it-yourself malware and phishing toolkits, then it was specialized sites selling stolen FTP credentials and credit card accounts, and now it’s the next phase in cybercrime: crimeware as a service. Researchers at Finjan, MarkMonitor, and Trend Micro are among those seeing a new cybercrime business model, where ...