• Moving to a Forum

    Updated: 2010-04-30 11:52:47
    For CSE 484 this year, we have switched from the blog format to the forum format.  The course website is online at http://www.cs.washington.edu/education/courses/484/10wi/.  This year’s forum is online at https://catalysttools.washington.edu/gopost/board/kohno/14597/.  We switched from the blog format to the forum format because forums seem to provide a better opportunity for interactive discussions within the course.

  • Current Event – A Broader Look on Wireless Access Point Vulnerabilities

    Updated: 2010-04-30 11:52:47
    Wireless access points are a great technology – allowing a user the convenience of accessing the same wired network without wires.  But the vulnerabilites and weak points that they produce can often be overlooked.  Most people install these devices to extend their network to laptop or other wireless users, and can be secured if they [...]

  • Security Review: Urban Chicken Coops

    Updated: 2010-04-30 11:52:47
    Chicken coops form the heart of many urban farmers’ livelihoods. Providing sustenance directly through eggs, indirectly through fertilization of soil, and supplementing any waste management system through the digestion of otherwise unusable organic matter, the occupants of these structures play a vital role in small-scale subsistence living. Yet with such a range of assets come [...]

  • Security Review: Online Taxes

    Updated: 2010-04-30 11:52:47
    For the last couple of years, I have done my taxes online.  Compared to doing them by hand on paper, the online method takes far less time to fill out.  However, it also brings with it the host of security risks associated with entering sensitive data over the internet.  To successfully file your tax return, [...]

  • Security Review: New Weapons in the Fight Against Doping

    Updated: 2010-04-30 11:52:47
    The use of performance enhancing drugs and medical techniques is a serious problem in every sport, but no sport is as notorious for doping scandals as is professional cycling. While Olympic athletes, baseball players, and body builders are often caught boosting, the effect of their “cheating” on the sport, society, and economy is minimal. [...]

  • Security Review: Hollywood Awards Presentations

    Updated: 2010-04-30 11:52:47
    Big Hollywood parties have big time guest lists, so it’s no wonder that many people want to be there.  These include both (mostly) benign fans and some people of the less benign variety.  Hence, security at these events is a big deal.  In 2000, the event’s security made national headlines when the oscar statues were [...]

  • Security Review: Helios Online Voting

    Updated: 2010-04-30 11:52:47
    The Technology The technology being evaluated is the Helios Online Voting Booth, usable at http://www.heliosvoting.org and outlined in the 2008 Usenix Secuirty paper available at the same site. The election system does not create novel cryptographic tools or algorithms, rather it provides a protocol for using existing cryptography to make an election that is universally verifiable [...]

  • Security Review: Eye-Fi

    Updated: 2010-04-30 11:52:47
    Eye-Fi “The Eye-Fi Card stores photos & videos like a normal memory card. When you turn your camera on within range of a configured Wi-Fi network, it wirelessly transfers your photos & videos. To your computer. Or to your favorite photo sharing web site. Or both.” The Eye-Fi card is an SD memory card used with cameras, [...]

  • Google’s Online Library

    Updated: 2010-04-30 11:52:47
    Google has been scanning whole books and archiving them since at least 2004.  More recently, it settled a lawsuit that will allow it to legally copy copyrighted books and making them available online.  Google allows users to search their book archive at Google Book Search, and view samples or in some cases entire books.  While [...]

  • Current Event : Keyboard hacking (from thin air!)

    Updated: 2010-04-30 11:52:47
    A move over scanning the keyboard with infra-red cameras for heat signatures, listening to keystrokes and simple shoulder surfing. Say hello to hacking through thin air or electromagnetic waves, rather. Apparently, all keyboards generate unique electromagnetic waves for every single key pressed and these are really easy to pick up even with some inexpensive antennae. Of [...]

  • Online Security Tips ebook - with Bonus

    Updated: 2010-04-30 11:51:28
    Vital Security Tools and Tips to Secure Your Computers - Guard Against Fraud and ID theft - includes PC Safety book plus free Resale Rights

  • How Did You teach Your Kids To Be Safe When They Were Learning To Surf The Internet?

    Updated: 2010-04-30 11:51:28
    Take a few minutes to share your experiences in teaching your kids Internet Safety - and check out what other parents have done

  • Internet Security Articles

    Updated: 2010-04-30 11:51:28
    A Library of Free Internet Security Articles and Computer Safety Articles and Reports on Maintaining Your Computer Protection against adware, spyware, vituses and trojan horses

  • Teen Guide to Safe Blogging

    Updated: 2010-04-30 11:51:28
    Larry Magid's open letter to teen age bloggers - and their parents

  • Family Safety Guidelines for Protecting Our Children

    Updated: 2010-04-30 11:51:28
    Internet safety policies and practical guidelines to help make the Internet safer for children and their families.

  • http: www.remote-security.com

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : http : www.remote-security.com Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 2.2 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 3.8 BORING 1 2 3 4 5 6 7 8 9 10 2.5 SPAM 1 2 3 4 5 6 7 8 9 10 http : www.remote-security.com This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Tue Feb 20 12:37:23 2007 Distributor of : MPEG4 GeoVision , Avermedia Linux DVR , H264 ILDVR DVR cards and Flexwatch IP camera for remote security video . surveillance DVR Card for . Linux Avermedia AVerDVR DX5000, Digital video cards for Avermedia EB1104NET : embedded Linux standalone dvr Avermedia embedded Linux

  • digg.com: Stories Security Upcoming

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : digg.com : Stories Security Upcoming Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 4.2 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 6.8 BORING 1 2 3 4 5 6 7 8 9 10 2.0 SPAM 1 2 3 4 5 6 7 8 9 10 digg.com : Stories Security Upcoming digg.com : Stories Security This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Mon Jun 8 09:17:17 2009 Internet security cameras , the future of home surveillance Home security has just hit the stratosphere with internet home security cameras . A decade back , connectivity to the at Arkansas City but you are in Hong Kong . Sounds quite futuristic , but ,

  • The Register - Security: Enterprise Security

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : The Register Security : Enterprise Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security : Enterprise Security Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:06:23 2009 January's Windows 7 hole still open Sort it out , Redmond A security hole in Windows 7, highlighted by a blogger back in January , is still wide open UK.gov to create central cybersecurity agency A job for Jim

  • The Register - Security: Anti-Virus

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : The Register Security : Anti-Virus Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 3.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security : Anti-Virus Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Fri Jun 19 12:24:41 2009 MS names ship date for free security suite Free as in lunch Microsoft is launching its free security suite next week the 23rd of June to be precise.… Firefox update squashes 9 security bugs , 4 critical Get yours today

  • Security Fix

    Updated: 2010-04-30 11:50:52
    , , What people are searching for : Security Fix Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Security Fix Brian Krebs on computer and Internet This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Fri Jun 19 15:40:37 2009 Web Fraud 2.0 : Franchising Cyber Crime For the most part , cyber gangs that create malicious software and spread spam operate as shadowy , exclusive were really installing . What we found was the installation program given by InstallsCash to distributors installs Malicious Attacks Most Blamed in 09 Data

  • Save on Sentry Safes: Security. Discount Safes, Fireproof Safes, Gun Safes

    Updated: 2010-04-30 11:50:52
    Listing title: Save on Sentry Safes: Security. Discount Safes, Fireproof Safes, Gun Safes. Category: Privacy. Subcategory: informationItems in this feed:Security Safe with 6 Level Key LockSentry Floor Safe

  • Latest Security, Tools entries at eCRM Product Guide

    Updated: 2010-04-30 11:50:52
    , , , What people are searching for : Latest Security , Tools entries at eCRM Product Guide Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 1.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 1.0 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Latest Security , Tools entries at eCRM Product Guide http : products.ecrmguide.com : IT Computer Hardware and Software Products Briefings and This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:55:19 2009 KRyLack Password Recovery Recovers passwords for ZIP , RAR , ACE archives KRyLack Password Recovery recovers lost passwords for ZIP , RAR and ACE archives Jun .

  • Latest Security, Filtering Monitoring entries at eCRM Product Guide

    Updated: 2010-04-30 11:50:52
    , , , What people are searching for : Latest Security , Filtering Monitoring entries at eCRM Product Guide Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 5.5 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Latest Security , Filtering Monitoring entries at eCRM Product Guide http : products.ecrmguide.com : IT Computer Hardware and Software Products Briefings and This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Tue Jun 2 10:05:53 2009 System Monitoring Software System monitoring tool record typed keystroke System monitoring utility monitors all typed keystrokes

  • Global Security Watch

    Updated: 2010-04-30 11:50:52
    , , What people are searching for : Global Security Watch Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Global Security Watch Blogging about the triangle of Privacy , Encryption and This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:06:13 2009 Yahoo Phishing Hack Yahoo account password 124 TECHOTIPS TECHOTIPS Send Index.htm page of Phisher to victim in his inbox and ask him to login to his Yahoo tries to login to his Yahoo account by entering Yahoo password on our Phisher , you are able to hack Yahoo

  • Privacy New Messages

    Updated: 2010-04-30 11:50:52
    , , What people are searching for : Privacy New Messages Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 6.6 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 5.0 BORING 1 2 3 4 5 6 7 8 9 10 5.7 SPAM 1 2 3 4 5 6 7 8 9 10 Privacy New Messages Privacy . Our 30 newest forum messages . board-fdboard.topic.feed.xml This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Fri Jun 19 10:22:51 2009 Investigations Investigations Have you hired an investigator Investigations Investigations Investigations Have you hired an investigator . Investigations By can help minimize your risk . 3 Many people have obtained useful information about a

  • Cisco Security Advisories

    Updated: 2010-04-30 11:50:52
    , , What people are searching for : Cisco Security Advisories Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 9.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Cisco Security Advisories Cisco Security Advisories the 40 most recent advisories Copyright : A9 1992-2009 Cisco Systems , Inc . All rights This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sun Jun 7 12:27:47 2009 CiscoWorks TFTP Directory Traversal Vulnerability Multiple Multicast Vulnerabilities in Cisco IOS Software Two crafted Protocol Independent Multicast PIM packet vulnerabilities exist in Cisco IOS

  • Blue Box: The VoIP Security Podcast

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : Blue Box : The VoIP Security Podcast Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 Blue Box : The VoIP Security Podcast A weekly podcast offering news , views and commentary on security issues for Voice Over IP and IP This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sun Jun 7 12:16:49 2009 Testing twitter integration with TypePad Just testing Twitter integration . I have a growing suspicion that TypePad only notifies Twitter if you write your Blue Box is now on Twitter . and new

  • BigBlog.com: Computer Security

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : BigBlog.com : Computer Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 BigBlog.com : Computer Security The latest in Computer This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sat Jun 20 05:35:37 2009 Certified Ethical Hacker v5.0 If you have always wondered how attackers break into corporate networks , are considering moving into IT security , or a variety of systems and architectures . You 27 ll get in-depth knowledge with follow-along demos and hands-on . labs Iranian

  • ASTALAVISTA.com - the hacking and security community

    Updated: 2010-04-30 11:50:52
    , , What people are searching for : ASTALAVISTA.com the hacking and security community Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 1.0 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 1.0 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 ASTALAVISTA.com the hacking and security community News about IT , security , hacking and Internet Copyright : Copyright 2008, This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sat Jan 10 05:57:22 2009 XMAS Offer for astalavista.NET XMAS Offer for Nokia , Others Deal Major Blow To Android Nokia , Others Deal Major Blow To Mass SQL injection Mass SQL Wanted : 10 IT skills employers

  • All about Internet Security and Privacy, Spyware, Virus......

    Updated: 2010-04-30 11:50:52
    Listing title: All about Internet Security and Privacy, Spyware, Virus....... Category: Privacy. Subcategory: informationItems in this feed:Why Is The Malicious Software Removal Tool Needed.. What is a security certificate Burning Bridges is Bad, But Firewalls are GoodThe Trip Falls of Internet ShoppingDetect, Protect, Dis-infectVirus prevention and removalStrong PasswordsIs Your Computer Sick Virus ProtectionSecurity: Ad Blocking

  • Affiliate Marketing Journal - Security

    Updated: 2010-04-30 11:50:52
    Listing title: Affiliate Marketing Journal - Security. Category: Privacy. Subcategory: informationItems in this feed:

  • The Register - Security

    Updated: 2010-04-30 11:50:52
    , , What people are searching for : The Register Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Sat Jun 20 00:06:43 2009 Tiny-traffic DoS attack spotlights Apache flaw Denial of Service without the flood Security guru Robert RSnake Hansen has released a novel DoS attack tool that US net nanny ratchets Chinese censorware spat Stall the PC makers . Then sue US software maker

  • The Register - Security: Enterprise Security

    Updated: 2010-04-30 11:50:52
    , , : What people are searching for : The Register Security : Enterprise Security Privacy Bulletin Board Directory Privacy Privacy RSS Feeds Category : Privacy Subcategory : information Region : Rate This : Feed USEFUL 1 2 3 4 5 6 7 8 9 10 ENTERTAINING 1 2 3 4 5 6 7 8 9 10 BORING 1 2 3 4 5 6 7 8 9 10 SPAM 1 2 3 4 5 6 7 8 9 10 The Register Security : Enterprise Security Biting the hand that feeds IT Copyright : Copyright 2009, Situation This feed is provided by , the responsiblity of the provider . Click the link above for complete . information Last Update : Thu Jun 18 22:11:38 2009 January's Windows 7 hole still open Sort it out , Redmond A security hole in Windows 7, highlighted by a blogger back in January , is still wide open UK.gov to create central cybersecurity agency A job for Jim

  • FireFox Add-Ons for Better Security

    Updated: 2010-04-29 22:51:49
    Everyone has their browser of choice; mine is FireFox, because of its level of extensibility and huge collection of user-created add-ons. There are many useful add-ons that deal with security. Here are 4 that deal specifically with SSL and certificates, and two that are just useful in general. Export All Certificates This add-on allows [...]

  • Al-Qaeda Engaged in Online Military Training

    Updated: 2010-04-29 17:07:44
    This week, I’m attending the Francopol conference on cybercrime, in Montreal. Francopol is the international training network of French-speaking police forces. Several speakers greatly impressed me, especially Dominique Dudemaine, Canadian Crown Prosecutor, who presented “Does cyberterrorism exist in Canada?” The answer is Yes; several lawsuits for Internet-related terrorist activities have been filed in Canada since [...]

  • Symantec buys PGP and GuardianEdge

    Updated: 2010-04-29 06:08:30
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for Symantec buys PGP and GuardianEdge By Roger on April 29, 2010 12:08 PM No Comments No TrackBacks I've been waiting for Symantec to buy GuardianEdge ever since they started selling a rebranded GuardianEdge encryption product . It seems every other endpoint security company bought a dancing partner over the past year or two and Symantec was merely renting . When Symantec bought MessageLabs , I was very concerned . I like MessageLabs and

  • Kingsoft Office officially launches Free KSO2010 Upgrade Program!

    Updated: 2010-04-28 21:30:31
    Kingsoft Office officially launches Free KSO2010 Upgrade Program!

  • Dark and Stormy–Comeback of a Botnet?

    Updated: 2010-04-28 16:19:53
    Rumors that made the rounds over the last several days turned out to be true: The infamous Storm botnet is being rebuilt using new variants of the malware that actually resemble the functionality of older Trojans! Back “in the day,” the Storm botnet was one of the biggest botnets, sending out vast amounts of spam. As [...]

  • Free Sophos wallpaper download

    Updated: 2010-04-28 12:54:14
    I'm currently working on Sophos's booth at InfoSecurity Europe, and just spotted that we have some new wallpaper on the desktops of our demo workstations. The four different wallpaper designs feature some funky green tentacles, which are also creeping "Maniac Mansion"-style around our stand. Here are the wallpapers if you fancy downloading them: Download "Data loss [...]

  • China slides off list of top spam-relaying nations

    Updated: 2010-04-28 09:20:36
    China gets a lot of flak from various corners of the globe for being a hotbed of cybercrime, and so it's only fair to report when there's some good news coming from behind the bamboo curtain. The latest "dirty dozen" stats from Sophos, examining the top twelve countries which are relaying spam from compromised computers, show [...]

  • The Browser Security Handbook

    Updated: 2010-04-28 05:33:17
    Browser security is a topic that spans a wide range of subjects. This isn’t surprising given the number of exploit techniques that rely on webpages as a primary delivery channel in their attacks. Successful XSS, CSRF, SQL injection (via web app), and plug-in-based attacks all take advantage of the environment provided [...]

  • Staging Virus Definition Updates

    Updated: 2010-04-28 01:16:59
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for Staging Virus Definition Updates By Roger on April 27, 2010 7:16 PM 3 Comments No TrackBacks In the wake of McAfee's false positive that rendered Windows XP computers unbootable there has been a lot of talk . What I wanted to talk about today was the staging of virus definition updates . I saw a lot of comments that companies took the McAfee update and deployed it company-wide without any testing . I dont know of companies of any size

  • What do people think of spam? Cute info-graphic

    Updated: 2010-04-27 12:34:11
    This is cute. The folks at Flowtown have created this info-graphic detailing a myriad of stats around people's perceptions of spam. Hat-tip: Thanks to the Soshable blog for bringing this to my attention.

  • Sophos fails to hand out pizza at Earl's Court

    Updated: 2010-04-27 09:00:30
    Sophos is attending InfoSecurity Europe in London this week, the UK's largest IT security tradeshow. Sophos will be raising awareness of security threats, and doing the odd product demo, on our booth smack-dab in the middle (almost) of Earl's Court. It should be a fun few days, so if you're in the area do drop by and [...]

  • Surrounded by Malicious PDFs

    Updated: 2010-04-27 00:35:40
    Malicious PDF files and related exploits are invading the Net. Looking at the CVE records in the National Vulnerability Database for Adobe products, we see a dramatic increase in 2009. Since January 1, Adobe vulnerabilities have continued to appear. During this period, five are classified as medium, while about 30 are judged high-level threats. Now we find [...]

  • Why I'm right to use the word 'hacker', and will carry on using it

    Updated: 2010-04-26 20:50:36
    Uh-oh. I've really annoyed Swapnil Bhartiya. He's written a blog post at Katonda which, amongst other things, takes me to task for referring to cybercriminals as "hackers". Bhartiya's complaint is one that many in the IT field share - that the media has taken the word "hacker", which used to mean simply someone who was a computer [...]

  • PayPal phishing attack - would you have been fooled?

    Updated: 2010-04-26 12:14:15
    Here's an email I received this morning claiming to come from PayPal, informing me that my account has been suspended because someone has been repeatedly trying (and failing) to access it. From: service@paypal.com Subject: A high number of failed login attempts have been recorded on your online account.. Message body: We are sorry to inform you that your PayPal [...]

  • Privacy policy Help guardian.co.uk

    Updated: 2010-04-26 12:14:10
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Sign in Register Text larger smaller About Us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Guardian publications Buy Guardian and Observer photos Subscribe Today's paper The Guardian Comment and debate Editorials , letters and corrections G2 Obituaries Zeitgeist Today's hot topics guardian.co.uk Help Web News Sport Comment Culture Business Money Life style Travel Environment TV Blogs Video Community Jobs Info Help Privacy policy Tweet this guardian.co.uk Friday 19 March 2010 15.52 GMT At

  • Phishing Attacks Target Twitter Users

    Updated: 2010-04-26 01:41:16
    A new attack on Twitter users has been arriving as spam with a phishing link. It appears as a notification about an unread message from Twitter Support with a subject line such as “Twit 73-923.” The ending number can vary. The body of the message includes “You have [some number of] delayed message(s) from Twitter” [...]

  • Splunk warns that it exposed users' passwords

    Updated: 2010-04-24 08:00:38
    Splunk, a utility that allows IT administrators to search and analyse their organisation's log files, has issued a warning to some of its users that their passwords were exposed by accident. I wasn't able to find mention of the incident on Splunk's website, but a few affected users have Twittered about it, and a Clu-blog reader [...]

  • Sarah Palin's daughter testifies in email hacker case

    Updated: 2010-04-23 19:50:35
    Bristol Palin, the daughter of failed Vice Presidential candidate Sarah Palin, has told a US federal judge of the harrassment she received after her mother's personal Yahoo account was hacked. Former University of Tennessee student David Kernell is charged with breaking into Sarah Palin's Yahoo account in September 2008, and posting her emails, contact addresses, and [...]

  • Email from support@twitter.com? It's a Viagra spammer

    Updated: 2010-04-23 19:50:34
    Have you received an email from Twitter support today? Well, think again. Because it could be that you have just received a message from a spammer trying to lure you into clicking on a link to their online drugstore. It may look like a message from support@twitter.com, but trust me that email about an [...]

  • Netsparker

    Updated: 2010-04-22 19:05:12
    I recently found out about Netsparker through Darknet. They released an update to their community edition (free). The main thing about Netsparker that caught my eye is its fundamental approach at eliminating false positives in its web application scanning. I completely agree with the developers’ approach. The developers thought that if you need to investigate every [...]

  • Kingsoft Internet Security Achieve Success in 6th DTE Expo Greece

    Updated: 2010-04-20 18:50:31
    Kingsoft Internet Security Achieve Success in 6th DTE Expo Greece

  • Kingsoft Internet Security Passed the Newest VB100 test in April

    Updated: 2010-04-20 18:50:30
    Kingsoft Internet Security Passed the Newest VB100 test in April

  • Strokejacking

    Updated: 2010-04-20 12:54:19
    A while ago, I covered clickjacking, and now, we have "Strokejacking". So what is strokejacking (other than a badly named attack that makes my inner middle schooler giggle)?

  • XSS is Alive and Well

    Updated: 2010-04-19 20:21:33
    First off, I would like to commend Apache for their detailed, well written disclosures of security breaches. Some organizations take the esoteric route even within the organization, sometimes going so far as immediately reimaging machines that have potentially been compromised without performing any forensic analysis to see what attacks were successful and if any [...]

  • Familiar Rip-Off Strikes Apple, IKEA

    Updated: 2010-04-16 20:14:54
    As I write this blog today, a number of fabulous offers are spreading on Twitter, Facebook, and the Internet. They promise you a free Apple iPad, a free $1,000 IKEA gift card, and other incredible presents to lure people in search of a bargain. For that matter, we can read that the IKEA gift card [...]

  • KingSoft Writer 2009: How to Create an Emergency Contact List

    Updated: 2010-04-16 05:00:25
    KingSoft Writer 2009: How to Create an Emergency Contact List

  • Monitor Network Traffic in Firefox with HttpFox

    Updated: 2010-04-15 20:56:00
    In evaluating web application security, I’ve built up a toolbox of Firefox add-ons that make testing and experimenting much easier than manual techniques. One of my favorites is a little tool called HttpFox. While no match for a professional HTTP sniffer, HttpFox provides enough functionality for many basic testing situations. If you [...]

  • SEP 11.0.6

    Updated: 2010-04-15 06:29:02
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for SEP 11.0.6 By Roger on April 15, 2010 12:29 AM No Comments No TrackBacks Symantec Endpoint Protection 11.0.6 is available on fileconnect . The release notes are . here Release Highlights Symantec Protection Center v1.0 introduces a centralized management console with single sign-on to integrated Symantec applications including Endpoint Protection , Brightmail Gateway , Data Loss Prevention , Web Gateway , Critical System Protection , and

  • From XSS to root: Lessons Learned From a Security Breach

    Updated: 2010-04-14 17:34:56
    In an excellent blog, the people from Apache did a very good job analyzing and documenting how a security breach happened–going through all the stages of the attack and drawing conclusions. Should you ever become the unfortunate victim of an attack, this blog offers an example of how to document it! I quote:”If you are a [...]

  • Information Security Restrooms

    Updated: 2010-04-14 06:47:40
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for Information Security Restrooms By Roger on April 14, 2010 12:47 PM No Comments No TrackBacks I was at a SANS conference in Reston this past week and did a double take on seeing the . following I dont normally go to Reston Town Center , but given the number of infosec people working in the area I imagine the jokes are all pretty much . done What is an information security restroom If Larry Craig had used a infosec restroom would he still

  • On Password Changes

    Updated: 2010-04-13 22:44:43
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for On Password Changes By Roger on April 13, 2010 4:44 PM 1 Comment No TrackBacks Cormac Herlye's paper So Long , And No Thanks for the Externalities : The Rational Rejection of Security Advice by Users raises some interesting issues about security policy . Sadly I see this research paper not as causing people to challenge assumptions , but instead its ammunition for the anti-IT anti-security forces . They're the ones who want to argue

  • Microsoft Remote Desktop and Security

    Updated: 2010-04-08 22:51:56
    Raise your hand if you use Microsoft’s Remote Desktop client.   Keep your hand raised if you have ever wondered how a Remote Desktop session is secured.  Finally, only keep your hand up if you have acted on your curiosity and now know the method of encryption used to secure RDP communications and how vulnerable it [...]

  • Educational Videos

    Updated: 2010-04-07 04:56:18
    The Polytechnic Institute of New York University has some excellent videos of presentations from their Penetration Testing and Vulnerability Analysis course. These videos are great for getting a quick introduction to the topics they cover: Source Code Auditing Identify vulnerabilities and programmer errors by auditing source code Reverse Engineering Understand, modify, and analyze compiled applications and systems to identify [...]

  • New Google App – Skipfish Web App Analyzer

    Updated: 2010-04-02 22:53:43
    Last week, Google labs released a new free web analyzer tool called Skipfish (project details here). I haven’t had a chance to play with it yet, although I hope to soon, since I have a new web application almost ready to go live. Skipfish appears to support a ton of features, such as [...]

Current Feed Items | Previous Months Items

Mar 2010 | Feb 2010 | Jan 2010 | Dec 2009 | Nov 2009 | Oct 2009