Archive for October 5th, 2007

Another Sony rootkit worms its way to the surface

October 5, 2007

Once caught, always a suspect? Yet another rootkit has been discovered in a Sony product, which just goes to show you: some might forgive, few forget.

read more | digg story

Destroy your data, the easy way!

October 5, 2007

Most of the time you want to avoid destroying your data. But eventually you will actually want to destroy it. For instance, if you were selling your hard drive, PC or Laptop ; you would want to make sure that person doesn’t have access to your files, email or personal info. fdisk isn’t enough, so check out these handy tools and tips.

read more | digg story

5 reasons restricting hacking is not like gun control

October 5, 2007

The German government has banned hacking tools — restricting them just like guns. People with hacking tools can steal your personal data, shut down your system and deface your web site — but is that any reason to ban them?

read more | digg story

How to: Secure A Wireless LAN

October 5, 2007

An unsecured wireless network is an open invitation to hackers to walk right in to your computer and steal your personal information, upload malware onto your computer, and otherwise terrorize you. Thankfully, securing your wireless connection is extraordinarily simple to do.

read more | digg story

MySpace worm exploits Quicktime weakness to steal logins and plant spyware

October 5, 2007

F-Secure has spotted an outbreak of a Javascript exploit that uses flaws in Apple’s Quicktime to grab MySpace profile data. It’s not easy to explain, but it’s a form of phishing: you visit what looks like a normal MySpace page, but the links have been altered to take you off-site (though that still looks like MySpace)

read more | digg story

Once Again JavaScript is the Problem

October 5, 2007

The latest example of this trend is a flaw revealed late last month in most versions of Adobe Reader — the ubiquitous program useful for viewing PDF documents. The trouble, once again, is with Javascript.

read more | digg story

Security paper shows how application can steal CPU cycles

October 5, 2007

The team presented a proof-of-concept program for Unix-based systems—although it could theoretically be adopted for any modern multitasking operating system—that allows a specified task to “cheat” and take more CPU cycles than the OS would normally allow it to have.

read more | digg story

How to STEAL AN ELECTION by hacking the vote

October 5, 2007

After reading this article, how can we trust the election process? “When it comes to reporting on electronic voting, it is very difficult to find a good way to convey to the nontechnical public how well and truly screwed up we presently are. So now it’s time to hit the panic button: in this article, we’re going to show you how to steal an election.

read more | digg story

How I Hacked Your LinkSys Router Which You Probably Bought at Best Buy

October 5, 2007

In a world where we all shop at the same stores and buy the same wireless equipment it is very easy to unintentionally hijack someone’s wireless connection. Here’s how this guy did it – by accident….

read more | digg story

How Identity Thieves Clone Your Credit Cards

October 5, 2007

This is why you should always pay cash when eating out. A waitress uses a special device to extract data from the credit card’s magnetic strip — includes name, address, etc. It only takes minutes to prep, and seconds to steal.

read more | digg story