Sunday, March 16th, 2008
Monday, 9am
Blackjack, a hacker working from an internet cafe in London, is about to launch an attack on a major government agency. His aim is to cause maximum disruption and embarrassment. And, according to security experts, his job is going to be worryingly easy.
"Most organisations have dozens of vulnerabilities they ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 15th, 2008
A series of well-orchestrated wireless phone-based phishing attacks against several financial institutions last week illustrates how scam artists are growing more adept at fleecing consumers by exploiting security holes in seemingly unrelated Internet technologies.
The scams in this case took the form of a type of phishing known as "vishing," wherein ...
Posted in Internet, Privacy, Security | No Comments
Friday, March 14th, 2008
Manufacturers of USB sticks and cards with fingerprint readers promise us that their data safes can only be opened with the right fingerprint. It turns out that an easy-to-find tool allows nosy parties to get around the protection in some products.
Many secure USB sticks consist of three components: flash memory ...
Posted in Hardware, Security | No Comments
Friday, March 14th, 2008
For security reasons one might want to disable or block downloading through Internet Explorer. There could be several other reasons for this including building a secure Internet kiosk, protecting your PC from malicious files, etc.
So far as I know, this should work with IE 6 or 7. I tested it ...
Posted in Coding, Internet, Security | No Comments
Friday, March 14th, 2008
Published: 2008-03-14,
Last Updated: 2008-03-14 15:33:49 UTC
by Kevin Liston (Version: 1)
Situation:
Over 10,000 legitimate websites have been compromised and now have an iframe that will direct visitors to a malicious website hosted on 2117966(dot)net. The malicious website attempts to exploit the vulnerability described in MS06-014 and a number of ActiveX vulnerabilities.
Successful exploitation ...
Posted in Coding, Internet, Security | No Comments