Home News Archive Translate Traducen |
News February 2005 |
28 February 2005 Guides, Papers, etc weblogs.asp.net: More miscreant hiding techniques and some interesting observations on the Hacker Defender rootkit . . . Read more
www.eeye.com:
seclab.cs.sunysb.edu: Fake FBI email Worm Exposed. Read more Vulnerabilities & Exploits www.securitytracker.com: CIS WebServer Discloses Files Outside of the Document Directory to Remote Users. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com: News money.cnn.com: BofA: 1.2 million accounts jeopardized. Read more
www.informationweek.com:
sanjose.bizjournals.com:
www.informationweek.com:
|
27 February 2005 Guides, Papers, etc www.cs.pitt.edu: WORM vs. WORM: Preliminary Study of an Active Counter�Attack Mechanism. Read more
www.finjan.com:
www.finjan.com:
www.pcworld.com:
www.astalavista.com: Vulnerabilities & Exploits www.mozilla.org: Known Vulnerabilities in Mozilla. Read more
www.mikx.de:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.milw0rm.com:
packetstormsecurity.org: News www.cio-today.com: Firefox: New Target for Hackers? Read more
www.computerworld.com:
www.rednova.com:
www.theregister.co.uk:
www.itp.net:
www.vnunet.com:
news.zdnet.co.uk:
|
26 February 2005 Guides, Papers, etc www1.cs.columbia.edu: The 3rd Workshop on Rapid Malcode (WORM). Call for papers. Read more Vulnerabilities & Exploits www.securitytracker.com: Mozilla Firefox XPCOM Access Flaw Lets Remote Users Execute Arbitrary Code. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.debian.org: News news.com.com: Payroll hole exposes dozens of companies. Read more
www.theregister.co.uk:
www.wired.com:
news.zdnet.co.uk:
www.theregister.co.uk:
news.xinhuanet.com:
news.com.com:
news.zdnet.co.uk:
news.com.com:
www.theregister.co.uk:
news.zdnet.com:
news.com.com:
|
25 February 2005 Guides, Papers, etc www.computerworld.com: The road to identity management: How to know who's who and what's what. Read more
www.astalavista.com: Vulnerabilities & Exploits www.k-otik.com: Cisco ACNS Default Password and Denial of Service Vulnerabilities. read more
xforce.iss.net:
www.cirt.net:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.theregister.co.uk: Windows licensing - don't swallow it, says MS. Read more
www.theregister.co.uk:
joongangdaily.joins.com:
www.wired.com:
www.theregister.co.uk:
www.pcworld.com:
www.theinquirer.net:
|
24 February 2005 Guides, Papers, etc Changing the Notification Process Developers have the opportunity to offer better vendor security procedures and notifications in an open-source world. Read more Vulnerabilities & Exploits www.k-otik.com: IBM Hardware Management Console Guided Setup Wizard Vulnerability. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.zdnet.com.au: Viruses, Trojans and spam: the new joint venture. Read more
www.informationweek.com:
www.gizmodo.com:
www.zdnet.com.au:
www.securityfocus.com:
slate.msn.com:
www.theregister.co.uk:
www.viruslist.com:
www.vnunet.com:
www.zdnet.com.au:
www.theinquirer.net:
www.informationweek.com:
castlecops.com:
www.informationweek.com:
www.theregister.co.uk:
www.informationweek.com:
|
23 February 2005 Guides, Papers, etc www.benedelman.org: How Google's Blogspot Helps Spread Unwanted Software. Read more
www.securityfocus.com
www.freep.com:
www.sans.org:
www.cs.plu.edu: Tools RootkitRevealer is an advanced root kit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootki Vulnerabilities & Exploits www.securitytracker.com: vBulletin 'misc.php' Lets Remote Users Injection PHP Code via the 'template' Parameter. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com: News www.theregister.co.uk: Wormability formulae weighs malware risks. Read more
www.theregister.co.uk:
www.theregister.co.uk:
news.zdnet.co.uk:
www.chron.com:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.theregister.co.uk:
|
22 February 2005 Guides, Papers, etc Early Bird: Catching worms while sysadmins sleep (pdf). Read more Vulnerabilities & Exploits www.k-otik.com/: Invision Power Board SML Codes Cross Site Scripting Vulnerability. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.securiteam.com: News habaneronetworks.com: Windows Firewall Has A Backdoor. Read more
www.pcauthority.com.au:
today.reuters.com:
www.billingsgazette.com:
www.net4nowt.com:
www.computerworld.com:
www.computerweekly.com:
www.vnunet.com:
www.it-observer.com:
www.vnunet.com:
www.expressnewsline.com:
|
21 February 2005 Tools freshmeat.net: Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. It is good if you don't want to have an SSH server running all the time, and only want to start it when needed. Read more Vulnerabilities & Exploits www.securitytracker.com: pMachine Include File Error in 'mail_autocheck.php' Lets Remote Users Execute Arbitrary Commands. Read more
www.securitytracker.com:
News www.vnunet.com: Call for unity in fight against cyber-crime. Read more
www.securityfocus.com:
www.insanely-great.com:
www.globetechnology.com:
nwc.securitypipeline.com:
www.bizjournals.com:
www.eweek.com:
|
20 February 2005 Guides, Papers, etc searchsecurity.techtarget.com: RSA 2005: A chat with Sybari's Joe Licari. Read more
www.computerworld.com:
www.cs.washington.edu: Tools www.hat-squad.com: Findjmp2 is a modified version of Findjmp from Eeye.com to find jmp,call,push in a loaded DLL. This version includes search for pop/pop/ret set of instructions that is usefull to bypass WinXP SP2 and Win2003 stack protection mechanism. Vulnerabilities & Exploits www.securitytracker.com: glftpd Plugins Disclose Files to Remote Authenticated Users. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News: www.theregister.co.uk: BT abandons scheme to block rogue diallers. Read more
www.keralanext.com:
|
19 February 2005 Guides, Papers, etc www.securityfocus.com: Complexity Kills Innovation. Read more
tennis.ecs.umass.edu:
www.apachesecurity.net: Tools www.sys-security.com: Xprobe2 is an active operating system fingerprinting tool with a different approach to operating system fingerprinting. Read more Vulnerabilities & Exploits www.securitytracker.com: Yahoo! Messenger Lets Remote Users Spoof Filenames During File Transfer. Read more
secunia.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
secunia.com:
secunia.com:
secunia.com:
www.debian.org: News: www.vnunet.com: Experts beat script kiddies at their own game. Read more
www.vnunet.com: www.pcadvisor.co.uk: Microsoft warns of new security threat. Read more
news.zdnet.co.uk:
msnbc.msn.com:
www.theregister.co.uk:
www.vnunet.com:
www.vnunet.com:
news.zdnet.co.uk:
|
18 February 2005 Guides, Papers, etc www.microsoft.com: A parent's primer to computer slang. Read more
www.rootkit.com:
Tools www.informit.com: Elcomsoft's PWSEX vs. AtStake's L0phtcrack (Revised). Read more Vulnerabilities & Exploits archives.neohapsis.com: IE/OE Restricted Zone Status Bar Spoofing. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.debian.org:
www.debian.org: News: habaneronetworks.com: Major Phishing Hole Found In IE and Outlook Express. Read more
www.cbronline.com:
www.securityfocus.com:
www.vnunet.com:
www.theregister.co.uk:
www.vnunet.com:
www.reuters.com:
www.reuters.com:
www.theregister.co.uk:
|
17 February 2005 Guides, Papers, etc research.microsoft.com: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. Read more
rootkit.host.sk:
ftp.research.microsoft.com:
research.microsoft.com:
www.schneier.com:
www.securityfocus.com:
www1.umn.edu: Vulnerabilities & Exploits www.k-otik.com: Advanced Linux Sound Architecture Stack-Execution protection Bypass. Read more
www.k-otik.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org: News: www.microsoft.com: Remarks by Bill Gates, Chairman and Chief Software Architect, Microsoft Corporation RSA Conference 2005: "Security: Raising the Bar". Read more
www.vnunet.com:
www.microscope.co.uk:
www.infoworld.com:
www.vnunet.com:
www.vnunet.com:
www.vnunet.com:
www.webroot.com:
www.theregister.co.uk:
www.theregister.co.uk:
|
16 February 2005 Guides, Papers, etc www.corante.com: Eight years of email stats, pass 1. Read more
www.javelinstrategy.com:
xss-proxy.sourceforge.net:
www.cs.ucsd.edu: Vulnerabilities & Exploits www.guninski.com: linux kernel 2.6 fun. windoze is a joke. Read more
www.k-otik.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News: seattletimes.nwsource.com: Microsoft readies its security arsenal. Read more
informationweek.securitypipeline.com:
www.theregister.co.uk:
news.zdnet.com:
www.newsfactor.com:
news.zdnet.com:
www.theregister.co.uk:
www.lawfuel.com:
news.xinhuanet.com:
www.earthtimes.org:
|
15 February 2005 Guides, Papers, etc www.amazon.com: The Art of Computer Virus Research and Defense. Read more
ghh.sourceforge.net: Tools ghh.sourceforge.net: "Google Hack" honeypot project. Read more Vulnerabilities & Exploits www.gentoo.org: Opera: Multiple vulnerabilities. Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securitytracker.com:
www.debian.org:
www.waraxe.us: News: www.securityfocus.com: Spyware, adware threat to be hot topic at security conference. Read more
www.theregister.co.uk:
www.virusthreatcenter.com:
seattletimes.nwsource.com:
www.computerweekly.com:
news.zdnet.co.uk:
www.securityfocus.com:
news.zdnet.co.uk:
www.bizjournals.com:
|
14 February 2005 Guides, Papers, etc www.cyberguard.com: A Brief Look at the Evolution of Killer Worms. Read more Vulnerabilities & Exploits tsyklon.informatik.rwth-aachen.de: Credit Card data disclosure in CitrusDB. Read more
www.gentoo.org:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
tsyklon.informatik.rwth-aachen.de: News: www.informationweek.com: You Call This Trustworthy Computing? Read more
www.securityfocus.com:
informationweek.com:
www.eweek.com:
www.eweek.com:
today.reuters.co.uk:
www.cooltechzone.com:
www.itp.net:
www.newstarget.com:
www.integratedmar.com:
|
13 February 2005 Guides, Papers, etc www.computerworld.com: The curse of the secret question. Read more
support.microsoft.com:
weblogs.asp.net:
2005.rsaconference.com:
www.astalavista.com: Tools www.microsoft.com: Microsoft Creates Free Utility for Detecting Network Sniffers. Read more
www.hashcash.org: Vulnerabilities & Exploits www.securitytracker.com: OpenPGP CFB Mode Is Subject to Adaptive Chosen-Plaintext Attacks. Read more
www.securitytracker.com:
www.milw0rm.com:
www.milw0rm.com:
www.milw0rm.com:
www.milw0rm.com: News: www.pcpro.co.uk: Children recruited to commit cyber crime claims report. Read more
www.sun-sentinel.com:
www.menafn.com:
www.vnunet.com:
www.vnunet.com:
www.computerworld.com:
www.pcpro.co.uk:
www.theregister.co.uk:
www.securitypipeline.com:
www.techweb.com:
news.com.com:
news.com.com:
www.pcpro.co.uk:
www.halifaxlive.com:
|
12 February 2005 Guides, Papers, etc www.howtocreate.co.uk: Browser speed comparisons. Read more
www.virusbtn.com:
www.geocities.com/amz: Vulnerabilities & Exploits www.k-otik.com: OpenPGP Cipher Feedback Mode (CFB) Chosen-Ciphertext Attacks. Read more
www.idefense.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org:
www.debian.org:
www.debian.org: News: www.microsoft.com: Proof-of-Concept Code Increases Risk to Computer Users. Read more
www.theregister.co.uk:
www.theregister.co.uk:
www.betanews.com:
www.eweek.com:
www.infoworld.com:
www.theregister.co.uk:
www.infoworld.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
informationweek.com:
|
11 February 2005 Guides, Papers, etc www-1.ibm.com: IBM Report: Surge in Viruses and Worms Targeting Mobile Devices, Satellite Communications Anticipated in 2005. Read more Vulnerabilities & Exploits securitytracker.com: DelphiTurk FTP Discloses Passwords to Local Users. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.idefense.com:
www.k-otik.com:
xforce.iss.net:
www.idefense.com:
www.debian.org:
www.debian.org:
www.debian.org:
www.debian.org: News: www.theregister.co.uk: Symantec anti-virus flaw hits 30 products. Read more
www.zdnet.com.au:
www.techweb.com:
www.securityfocus.com:
www.theregister.co.uk:
news.com.com:
news.com.com:
news.com.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.wwwcoder.com:
news.com.com:
www.infoworld.com:
news.com.com:
|
10 February 2005 Guides, Papers, etc www.securityfocus.com: Penetration Testing IPsec VPNs. Read more
www.microsoft.com:
story.news.yahoo.com: Vulnerabilities & Exploits www.immunitysec.com: SMB remote vulnerabilities in Windows. Read more
www.k-otik.com:
www.idefense.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.k-otik.com:
www.coresecurity.com:
xforce.iss.net:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
lists.netsys.com: News: www.microsoft.com: Microsoft Security Bulletin Summary for February, 2005. Read more
www.theregister.co.uk:
www.theregister.co.uk:
news.com.com:
www.securityfocus.com:
www.securityfocus.com:
www.securityfocus.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.vnunet.com:
www.vnunet.com:
www.vnunet.com:
www.vnunet.com:
|
08 February 2005 Guides, Papers, etc www.cs.ucsd.edu: Internet Outbreaks: Epidemiology and Defenses. Read more Vulnerabilities & Exploits www.k-otik.com: Multiple Browsers URL and SSL Certificates Spoofing Vulnerability. Read more
www.k-otik.com:
www.idefense.com:
www.idefense.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.debian.org:
www.mikx.de: News: www.theregister.co.uk: Firefox spoofing flaw goes international. Read more
news.zdnet.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
news.com.com:
|
07 February 2005 Guides, Papers, etc zeedo.blogspot.com: Multiple AV vendors ignoring tar.gz. Read more
www.scs.carleton.ca: Tools www.flowsecurity.org: Flaw Seeker - Buffer Overflow Tracking Tool. Read more Vulnerabilities & Exploits www.k-otik.com: IBM AIX "auditselect" Local Format String Vulnerability. Read more
www.securitytracker.com:
www.securiteam.com: News: www.pcworld.idg.com.au: MSN Messenger worm raised to medium threat. Read more
www.vnunet.com:
www.sun-sentinel.com:
www.oreillynet.com:
www.neowin.net:
news.zdnet.com:
news.zdnet.com:
news.com.com:
www.yonhapnews.co.kr:
www.theinquirer.net:
www.gamespot.com:
www.computerworld.com:
management.silicon.com:
|
06 February 2005 Guides, Papers, etc www.benedelman.org: How VeriSign Could Stop Drive-By Downloads. Read more
www.eecs.umich.edu: Vulnerabilities & Exploits www.securitytracker.com: Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Request. Read more
www.securitytracker.com: News: www.theregister.co.uk: Reboot daily, Tablet users advised. Read more
castlecops.com:
searchsecurity.techtarget.com:
www.pcworld.com:
www.eweek.com:
www.eweek.com:
dsc.discovery.com:
|
05 February 2005 Guides, Papers, etc sfgate.com: Why Does Windows Still Suck? Why do PC users put up with so many viruses and worms? Why isn't everyone on a Mac? Read more Vulnerabilities & Exploits www.debian.org: DSA-668-1 postgresql -- privilege escalation. Read more
www.debian.org:
www.debian.org:
www.debian.org: News: www.theregister.co.uk: MSN Messenger worm seeds zombie networks. Read more
news.zdnet.co.uk:
www.securityfocus.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.it-observer.com:
www.sophos.com:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.chron.com:
www.thewhir.com:
athens-olympics-2004.newkerala.com:
|
04 February 2005 Guides, Papers, etc www.vnunet.com: Bugwatch: The commercialisation of malware. Read more
security-papers.globint.com.a:
www.hackbusters.net:
www.securityfocus.com: Tools cse.msstate.edu: Travesty is an interactive program for managing the hardware addresses (MAC) of ethernet devices on your computer. It supports manually changing the MAC, generating random addresses, and applying different vendor prefixes to the current address. It also allows the user to import their own lists of hardware addresses and descriptions that can be navigated from within the Travesty interface. Read more Vulnerabilities & Exploits www.clickrisk.com: Clickrisk Advisory: Keyword Hijacking / Google Adwords Flaw. Read more
www.k-otik.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News: www.securityfocus.com: Supreme Court puts hacker sentences up for grabs. Read more
www.computerworld.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.ciol.com:
www.vnunet.com:
www.vnunet.com:
www.eweek.com:
www.vnunet.com:
www.theregister.co.uk:
|
03 February 2005 Guides, Papers, etc www.securityfocus.com: Apache 2 with SSL/TLS: Step-by-Step, Part 2. Read more
www.peterszor.com: Vulnerabilities & Exploits securitytracker.com: Cisco IP/VC Hard-Coded SNMP Community Strings Let Remote Users Access the Device. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.debian.org: News: news.com.com: Zombie trick expected to send spam sky-high. Read more
www.theregister.co.uk:
news.com.com:
www.vnunet.com:
news.zdnet.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.net4nowt.com:
news.com.com:
www.theregister.co.uk:
www.it-observer.com:
www.theregister.co.uk:
www.russellbeattie.com:
uk.news.yahoo.com:
www.vnunet.com:
www.webuser.co.uk:
|
02 February 2005 Guides, Papers, etc engr.smu.edu: Intrusion Detection for Viruses and Worms. Read more Vulnerabilities & Exploits www.k-otik.com: Squid Handling of Oversized Reply Headers Vulnerability. Read more
www.milw0rm.com:
secunia.com:
www.debian.org:
www.debian.org:
www.securitytracker.com: News: www.pcworld.idg.com.au: Microsoft seen poised to push anti-virus. Read more
en.chinabroadcast.cn:
en.chinabroadcast.cn:
www.theregister.co.uk:
www.pcworld.idg.com.au:
news.zdnet.com:
news.zdnet.com:
news.zdnet.co.uk:
www.theregister.co.uk:
news.zdnet.com:
|
01 February 2005 Guides, Papers, etc www.theregister.co.uk: Interview with a link spammer. Read more
www.securityfocus.com:
www.ngssoftware.com:
www.astalavista.com:
www.pcworld.com:
www.research.ibm.com: Tools www.diamondcs.com.au: Advanced Process Manipulation. DiamondCS APM is an advanced process/module viewer and manipulation utility that allows unique control over target processes by becoming a part of them. Read more Vulnerabilities & Exploits securitytracker.com: ngIRCd Buffer Overflow in Lists_MakeMask() Lets Remote Users Deny Service. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.k-otik.com: News: www.betanews.com: New Sober Worm Surfaces. Read more
www.scmagazine.com:
news.zdnet.co.uk:
www.vnunet.com:
www.gcn.com:
www.antiphishing.org:
news.zdnet.co.uk:
www.theregister.co.uk:
www.theinquirer.net:
www.theregister.co.uk:
|
Copyright� MegaSecurity.org