Duplicating keys from a photograph

Monday, November 17th, 2008

Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine. Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...

Vulnerability discovered in SSH specification

Monday, November 17th, 2008

According to the UK-based Centre for the Protection of National Infrastructure (CPNI), an error in the secure shell protocol (SSH) specification can in rare cases be exploited to reconstruct part of the plain text. According to their description of the error, the standard OpenSSH configuration allows 32 bits of plain ...

Antivirus 2009: How to Remove Fake AV Software

Thursday, November 13th, 2008

A new threat that comes under the guise of a genuine antivirus program has become increasingly prevalent over the past year. Offering to locate and remove malware from your PC, this rogue will actually install a Trojan on your unsuspecting system. The process is usually initiated when you click a ...

Firefox 3.0.4 closes nine security holes

Thursday, November 13th, 2008

The Mozilla Foundation has released Firefox version 3.0.4 to close nine security holes. The developers rated four of the holes as critical because they allow attackers to execute arbitrary code on the victim's system. One of the critical holes is a classical buffer overflow that can be triggered via specially ...

AVG Virus Scanner Accidentally Removes Critical Windows Component

Tuesday, November 11th, 2008

The world of computer security can be a scary place for friends and foes alike. This weekend users' found their AVG software updated with a new virus definition file. Then they quickly found their computers crashing. What was discovered was that the new virus definition file mistook user32.dll, a ...