Written by ph0bYx
|
Tuesday, 15 December 2009 15:17 |
By Kim Zetter, Wired.com Hackers have released an application designed to thwart a Microsoft-packaged forensic toolkit used by law enforcement agencies to examine a suspect’s hard drive during a raid.
|
Last Updated on Tuesday, 15 December 2009 15:20 |
|
Written by ph0bYx
|
Sunday, 13 December 2009 12:45 |
H-Online.com Several Linux distributors are releasing updated kernel packages to close security holes in the kernel. For instance, very large packets can reportedly be used to remotely provoke a flaw in the TCP/IPv4 stack`s ip_defrag() (net/ipv4/ip_fragment.c) function. This can potentially cause null-pointer dereferencing and crash a system.
|
Written by ph0bYx
|
Thursday, 10 December 2009 18:27 |
By Zeljka Zorz, Net-Security.org Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet. Botnets - apart from inundating out inboxes with spam - can also be used for ulterior purposes such as executing DDoS attacks or hosting websites, so understanding the ˝modus operandi˝ and size behind the well-known names is a good idea.
|
Last Updated on Thursday, 10 December 2009 18:45 |
Written by ph0bYx
|
Thursday, 10 December 2009 18:25 |
BBC.co.uk A Chinese woman managed to enter Japan illegally by having plastic surgery to alter her fingerprints, thus fooling immigration controls, police claim. Lin Rong, 27, had previously been deported from Japan for overstaying her visa. She was only discovered when she was arrested on separate charges.
|
Last Updated on Thursday, 10 December 2009 18:37 |
Written by ph0bYx
|
Thursday, 10 December 2009 18:17 |
By Robert McMillan, PCWorld.com For US$34, a new cloud-based hacking service can crack a WPA (Wi-Fi Protected Access) network password in just 20 minutes, its creator says.
|
Last Updated on Thursday, 10 December 2009 18:45 |
|
|
|
Page 39 of 40 |