Category Archives: Miscellaneous
XSS in the Wild (Updated)
When I recently tried to look up some information about the song L’America by The Doors, I stumbled upon the site songfacts.com (http://www.songfacts.com/detail.php?id=278). At the site, I was immediately greeted by a popup box cheerfully proclaiming “HAI2U”. After having dealt … Continue reading
Current events: Microsoft offers money for catching Conficker virus creator
I didn’t pay much attention to the event mentioned earlier about Conficker virus, until this new event related to that event arose – after all, is it such a rare occasion being infected by a virus. To remind you, it … Continue reading
Current Event: Safety of Encryption from future Quantum Computers
All of us feel a certain kind of safety when we are dealing with credit cards, online banking and any other transaction or process which should be secure because we know that our personal information is protected by cryptographic systems. … Continue reading
Current Event: Tracking BitTorrent
The Air Force Institute of Technology recently announced a new technique for “detecting and tracking illegal content transferred using the BitTorrent file-trading protocol.” The authors claim their technique differs from previous attempts, because it is does not change any of … Continue reading
Security review: Powered Exoskeletons
Exoskeletons look impressive in movies. They look impressive in real life also. Electronics reads brain signals sent to muscles and cause actuators to move, thus ‘amplifying’ human strength. Exoskeletons are close to get mass-produced and available to people around the … Continue reading
Security Review: My Linksys Router
This morning, my power for some reason switched off, crashing something in my router and killing my laptop battery. For the rest of the day, wireless was down at my house and my roommate and I were physically plugging in … Continue reading
Current Event: Spike in Online Game hacking
According to an article on Gamasutra online game hacking spiked in 2008. It was noted that it usually wasn’t the games themselves being directly attacked, rather attackers would use social engineering or other techniques to install malware, such as keyloggers, … Continue reading
Current Events – Infections that begin with windshield fliers
Not all computer malware infections are done completely electronically. In recent events, cars in Grand Forks, North Dakota were tagged with “windshield fliers” which resembeled a parking ticket, stating they were violating the “standard parking regulations” and that in order … Continue reading
Microsoft changes Windows 7 UAC after new exploit surfaces
Source: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9127392 The User Account Control (UAC) in Microsoft’s Windows 7 has already been compromised. Two programmers have written code, which can alter UAC settings and upon restart of the machine execute arbitrary code with administrative privileges. The basis of … Continue reading
Security Review: Face Recognition Software
According to an article, Toshiba is producing PC’s that come with not only fingerprint readers but facial recognition software. The software uses a webcam built into the PC in order to identify the user. This software is designed so only the user … Continue reading