Monthly Archives: February 2008
Vista SP1 with altered WGA Strategy, Nag instead of Disable
Adrian Kingsley-Hughes has a new blog posting over at ZDNet reviewing the changes Microsoft made to its Vista WGA (Windows Genuine Advantage – its authenticity check for pirated software) with the SP1 update. In a nutshell, it appears Microsoft has decided to … Continue reading
Local Root Exploit for Linux 2.6 Discovered
A new vulnerability has been discovered in the 2.6 Linux kernel that allows a local user to obtain a root shell. The bug description was posted within the last 24 hours, and includes exploit code that works on a large … Continue reading
Toshiba’s New Random Number Generator
Toshiba has recently unveiled a new IC which is capable of generating 2 megabits/second of random bits. The IC utilizes analog noise generated by electrons trapped on a silicon nitride (SiN) layer of a transistor. The electrons randomly are bound … Continue reading
Security Review: Smart pillboxes, maybe too smart?
Recently an MIT research team has developed a smart pillbox to help combat the problem of patients failing to take their medication at prescribed intervals. This problem of over/underdosing of the drug by the patient accounts for ~10% of hospital … Continue reading
Firefox “View-Source” Vulnerability
I thought that since most of us use Firefox people might care – apparently the default installation/settings of Firefox’s latest release allow all scripts written on websites to be executed. I don’t know with what privileges the code executes, but … Continue reading
Hackers Declare War On Scientology
In the past couple of weeks, a loosely organized group of people have come together to attack the church of Scientology in a variety of technological related ways. The core group that has headed up these attacks calls themselves “Anonymous”, … Continue reading
Security Review: Tor
Tor (http://www.torproject.org/) is a service and application to enable anonymous access to the Internet. It works by relaying network requests through a number of peers before ultimately accessing the resources requested. In this way, those listening on your connection will … Continue reading
Anti-Virus Vendor Hacked
I just read an article about an Indian security company AvSoft whose website got hacked and distributed malicious code rather than their own when users tried to download software. The attack used was iFrame injection on the vulnerable site. From … Continue reading
Diebold/Premier Voting Machine Key Copied
Adding to the current furor of news surrounding the issue of electronic voting machines, an egregious mistake by American voting machine producer Diebold (now known as Premier Election Systems) has lead to heightened doubts concerning the integrity of electronic voting. … Continue reading
Just for fun
I came across this on xkcd.com. Thought you all might enjoy it! For more fun, check out http://xkcd.com/341/ and read through http://xkcd.com/345/.