Tuesday, July 15th, 2008
Ever wondered what name is behind some obscure gmail address? Maybe your preferred gmail address was taken and you’re wondering who took it?
Here’s a cute vulnerability in the gmail system that comes from the strong tie-ins between gmail, the google calendar and all the other services.
Source:
http://blogs.securiteam.com/index.php/archives/1113
Posted in Internet, Privacy, Security, Software | No Comments
Monday, July 14th, 2008
The exploit discovered by IOActive's Dan Kaminsky, takes advantage of a fundamental flaw in the DNS (Domain Name Server) protocol. Organizations should move quickly to patch vulnerable DNS servers against a flaw revealed last week. Dan Kaminsky said the bug can be exploited to redirect Internet traffic, but the problem ...
Posted in Internet, Security, Software | No Comments
Monday, July 14th, 2008
FWAuto (Firewall Rulebase Automation) is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files.
Maybe ...
Posted in Internet, Privacy, Security, Software | No Comments
Friday, July 11th, 2008
Antivirus software vendor Sophos has reported the discovery of a DoS vulnerability in some of its products. According to the security advisory, specially crafted attachments to emails can bring down Sophos E-mail Appliance, Pure Message for UNIX and Sophos Anti-Virus Interface (SAVI). For the attack to succeed, the MIME attachment ...
Posted in Internet, Security, Software | No Comments
Thursday, July 10th, 2008
On Thursday, Check Point Software Technologies released updated versions of all its ZoneAlarm products, addressing an incompatibility with a patch Microsoft released earlier this week.The fix requires ZoneAlarm users to download the latest version, 7.0.438.000, from its site. A reboot is required to complete installation.Since Tuesday, ZoneAlarm customers have complained ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments