Rodney Campbell's Blog

2007.11.21 Daily Security Reading

by on Nov.21, 2007, under Security

Researchers study open-proxy attacks

Advertising and click-through fraud top the list of malicious activities funnelled through open proxy servers.

Adding Math to List of Security Threats

One of the world’s most prominent cryptographers issued a warning on Friday about a hypothetical incident in which a math error in a widely used computing chip places the security of the global electronic commerce system at risk.

Hackers Use Banner Ads on Major Sites to Hijack Your PC

The worst-case scenario used to be that online ads are pesky, memory-draining distractions. But a new batch of banner ads is much more sinister: They hijack personal computers and bully users until they agree to buy antivirus software.

90% of IT Professionals Don’t Want Vista

A survey by King Research has found that Ninety percent of IT professionals have concerns using Vista, with compatibility, stability and cost being their key reasons. Interestingly, forty four percent of companies surveyed are considering switching to non-Windows operating systems, and nine percent of those have already started moving to their selected alternative.

Know Your Enemy – Behind the Scenes of Malicious Web Servers (pdf)

In this paper we will give a brief functional overview of several web exploitation kits, then delve into answering the questions above through analysis of these kits and malicious web servers that use it. The web exploitation kits that we will examine are Webattacker, MPack and Icepack. We conclude with implications of our discoveries on client honeypot technology and future studies on malicious web servers.

Using Google To Crack MD5 Passwords

A security researcher at Cambridge was trying to figure out the password used by somebody who had hacked his Web site. He tried running a dictionary through the encryption hash function; no dice. Then he pasted the hacker’s encrypted password into Google, and voila — there was his answer. Conclusion? Use no password that any other human being has ever used, or is ever likely to use, for any purpose. I think.

Comments are closed.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.