Monday, March 31st, 2008
Building on earlier research into cold-boot attacks on computer memory, two consultants showed off their prototype tools for grabbing passwords from untended computers, during a session at the CanSecWest conference last week.
The consultants -- Sherri Davidoff and Tom Liston, both of security firm Intelguardians -- found that numerous Windows and ...
Posted in Hardware, Privacy, Security | No Comments
Monday, March 31st, 2008
A wave of April Fool's Day related Storm mails have just been sent out. Similar as the other times with a link that points to an IP address.
Posted in Coding, Internet, Privacy, Security | No Comments
Monday, March 31st, 2008
A while ago we blogged about the MBR rootkit, which has been getting attention from all the security vendors. We're glad to inform you that the latest version of the F-Secure BlackLight standalone rootkit scanner now detects MBR rootkit infections.
BlackLight has stood the test of time ever since it was ...
Posted in Hardware, Privacy, Security, Software | No Comments
Sunday, March 30th, 2008
"I'm proud to announce the release of Wireshark 1.0. This is the culmination of nearly ten years of hard work by a team of brilliant and talented developers. It is an honor to be able to work with these people.
On behalf of the development team, I would like to thank ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Sunday, March 30th, 2008
Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor.
Among other activities, MarkMonitor tracks phishing attacks that target brand names.
Researchers compiled a list of 750 Google search terms that are used to track down ...
Posted in Internet, Privacy, Security | No Comments