Anatomy of a hack attack

Sunday, March 16th, 2008

Monday, 9am Blackjack, a hacker working from an internet cafe in London, is about to launch an attack on a major government agency. His aim is to cause maximum disruption and embarrassment. And, according to security experts, his job is going to be worryingly easy. "Most organisations have dozens of vulnerabilities they ...

The Anatomy of a Vishing Scam

Saturday, March 15th, 2008

A series of well-orchestrated wireless phone-based phishing attacks against several financial institutions last week illustrates how scam artists are growing more adept at fleecing consumers by exploiting security holes in seemingly unrelated Internet technologies. The scams in this case took the form of a type of phishing known as "vishing," wherein ...

Secure USB sticks cracked

Friday, March 14th, 2008

Manufacturers of USB sticks and cards with fingerprint readers promise us that their data safes can only be opened with the right fingerprint. It turns out that an easy-to-find tool allows nosy parties to get around the protection in some products. Many secure USB sticks consist of three components: flash memory ...

Block Downloading of Files in Internet Explorer

Friday, March 14th, 2008

For security reasons one might want to disable or block downloading through Internet Explorer. There could be several other reasons for this including building a secure Internet kiosk, protecting your PC from malicious files, etc. So far as I know, this should work with IE 6 or 7. I tested it ...

2117966(dot)net – Mass iframe injection

Friday, March 14th, 2008

Published: 2008-03-14, Last Updated: 2008-03-14 15:33:49 UTC by Kevin Liston (Version: 1) Situation: Over 10,000 legitimate websites have been compromised and now have an iframe that will direct visitors to a malicious website hosted on 2117966(dot)net. The malicious website attempts to exploit the vulnerability described in MS06-014 and a number of ActiveX vulnerabilities. Successful exploitation ...