Archive for October, 2007
An analysis of identity-theft cases closed by the U.S. Secret Service in the past six years has found that identity thieves typically do not have a criminal record and are generally not known by their victims.
Two pupils have been suspended from a private school after they were found to be members of a ‘dogging’ group featured in facebook.
Users will see that, for example, antivirus is turned on, but actually it isn’t scanning for viruses.
Data-leak prevention, behavior-based malware detection among focus areas.
New Purdue University research shows steganography, long considered a minor threat, may be on the rise.
ElcomSoft has harnessed the combined power of a PC’s Central Processing Unit and its video card’s Graphics Processing Unit.
In an exclusive interview with Wired News, gun-for-hire hacker Robert Anderson tells for the first time how the Motion Picture Association of America promised him money and power if he provided confidential information on TorrentSpy, a popular BitTorrent search site.
A vulnerability in BIND 9 allows remote attackers to cause a cache poisoning attack against it.
An uncensored real-time how I exploited a vulnerability in a kernel hardened EAL4+ certified firewall.
The study centered around testing the effectiveness of the top three web application scanners in the following 4 areas. Links crawled, Coverage of the applications tested using Fortify Tracer, Number of verified vulnerability findings and Number of false positives.
The latest Storm variants have a new twist. They now use a 40-byte key to encrypt their Overnet P2P traffic.
An individual claiming to represent the Russian Business Network has denied media reports the company provides Web hosting services to numerous cyber criminal operations.
Add these extensions to Firefox when you’re looking to do some hacking.
He says the device will still be vulnerable even after Apple patches it.