Category Archives: Current Events
Current Events: British Police Want DNA of Children
From The Guardian, and on Slashdot. Police in the United Kingdom may soon be be able to collect DNA samples from children if they exhibit behaviors that suggest they may commit crimes later in life, at least if Scotland Yard … Continue reading
Current Events: No need for jello, fingerprint USB sticks are easy to crack.
No need to go to great lengths to try to spoof finger print scanners on USB sticks. You can just tell the device that the data is public. Researches discovered this vulnerability in models from 9pay and A-Data fingerprint USB … Continue reading
Hundreds of Thousands of Web Pages Hijacked
McAfee noticed Wednesday an ongoing attack that modifies web pages to redirect traffic to another site in China. This site then infects PC’s with a Trojan to steal personal information, including usernames/passwords for online banking. According to McAfee, “one gang” … Continue reading
Virus laden hardware emerges
While the idea of software viruses is by no means new to those who work with computers, a new vector of attack seems to be developing in the form of hardware shipped from the manufacturer that is already infected with malware. … Continue reading
Hackers hit Harvard
It was recently announced that last February at least one hacker was able to gain access on one server at Harvard University potentially viewing private information on up to 10,000 grad students and applicants of the Graduate School of Arts … Continue reading
Linux server attacked more than all version of windows combined
Zone-H(http://www.zone-h.org/content/view/14928/30/) has recently released a statistical breakdown of all the attacks from last three years. Surprisingly, Linux servers are the most attacked servers, even more than all version of windows combined. They suspect the reason for this is due to … Continue reading
The House on Amending FISA Act
Today the House of Representatives voted on a bill that would amend the FISA Act of 1978, which deals with government wiretapping. The amendments would deny amnesty to telecommunication industries for complying with illegal warrant less wiretaps by the Bush … Continue reading
Feature or Flaw?
According to an article found at Dark Reading, Adam Boileau from Immunity Inc, has decided after two years to make publicly available his tool Winlockpwn that “lets an attacker take over a ‘locked’ Windows machine without even stealing its password” … Continue reading
Security Review: Apple iPhone 3rd party application support
On Thursday, Apple happily unveiled its plan for third party support of native iPhone applications. The plan involves an application development and distribution pipeline including an iPhone SDK, a suite of IDE tools, and a sales and distribution plan through … Continue reading
The Goolag Scanner and Google Hacking
Bruce Schneier posted on his blog earlier in the week about a new, free, open source application by the “Cult of the Dead Cow” (cDc) called Goolag Scanner. It essentially automates a technique called Google Hacking, which was pioneered by … Continue reading