Home News Archive Translate Traducen |
News April 2005 |
30 April 2005 Guides, Papers, etc www.infectionvectors.com: Beagle Alert. Read more
www.viruslist.com:
www.internetnews.com:
www.securityfocus.com:
www.eeproductcenter.com:
www.eeproductcenter.com:
www.pcworld.com:
www.computerworld.com: Vulnerabilities & Exploits www.securitytracker.com: Symantec AntiVirus RAR Decomposition Error Lets Certain RAR Archives Bypass Anti-virus Detection. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.newscientist.com: Google searches for quality not quantity. Read more
www.theregister.co.uk:
www.theregister.co.uk:
www.pcworld.com:
www.pcworld.com:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.computerworld.com:
www.pcworld.com:
|
29 April 2005 Guides, Papers, etc The stupidest hacker on earth. This is the story of "bitchchecker" (the hacker) a user who lost it because he thought he had been kicked of a RC channel by "Elch". The hacker comes back on the channel threatening to hack and ruin Elch machine, and dares Elch to give his IP address. The address given was 127.0.0.1 (which is anyone's local IP address - you own IP, if you want), but bitchchecker was not knowledgeable enough to know that and tried to use a software to destroy what he thought was Elch hard drives... Read more
www.claymania.com:
internet-insecurity.com:
www.mobilepipeline.com: Tools: druid.caughq.org: hcraft is a HTTP systems penetration testing tool designed to make exploitation of known vulnerabilities in HTTP systems a dynamic, simple process. hcraft is intended to help take the details out of executing HTTP based attacks that require you to specially craft an HTTP request. Read more
druid.caughq.org: Vulnerabilities & Exploits www.securitytracker.com: Uapplication Products Disclose the Database to Remote Users and Let Remote Authenticate Administrators Upload Arbitrary Files. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org:
www.debian.org: News www.theregister.co.uk: Firefox doubles market share as IE slips. Read more
www.computerworld.com.au:
www.theregister.co.uk:
www.t2.fi:
www.itsecurity.com:
www.11alive.com:
www.vnunet.com:
www.vnunet.com:
www.vnunet.com:
www.eweek.com:
www.theregister.co.uk:
spamkings.oreilly.com:
news.com.com:
news.zdnet.co.uk:
|
28 April 2005 Guides, Papers, etc www.hoti.org: Design of a System for Real-TimeWorm Detection. Read more
www.viruslist.com:
www.microscope.co.uk:
www.securityfocus.com:
www.securityfocus.com:
cne.gmu.edu:
Vulnerabilities & Exploits www.securitytracker.com: MaxDB Buffer Overflow in getIfHeader() WebDAV Function Lets Remote Users Execute Arbitrary Code. Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org: News www.asahi.com: Trend Micro antivirus fix wasn't tested before release. Read more
www.theregister.co.uk:
www.krqe.com:
news.zdnet.com:
news.zdnet.com:
news.zdnet.co.uk:
news.zdnet.com:
news.zdnet.com:
news.zdnet.com:
news.zdnet.com:
|
27 April 2005 Guides, Papers, etc www.securityfocus.com: Microsoft's reveals hardware security plans, concerns remain. Read more
www.ngssoftware.com: Vulnerabilities & Exploits www.gentoo.org: Rootkit Hunter: Insecure temporary file creation. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org: News asia.cnet.com: Microsoft to add 'black box' to Windows. Read more
www.theinquirer.net:
news.zdnet.co.uk:
www.computerworld.com.au:
www.itbusiness.ca:
asia.cnet.com:
news.zdnet.co.uk:
www.theregister.co.uk:
news.zdnet.co.uk:
|
26 April 2005 Guides, Papers, etc www.eweek.com: The Sad State of Spyware. Read more
www.eweek.com:
www.boersenreport.de:
www.eweek.com: Tools: cse.msstate.edu: GoogleSweep is a pen-test tool for information-gathering that uses Google to find information on IP addresses and hostnames on a target network. Read more Vulnerabilities & Exploits www.securitytracker.com: MaxDB HTTP Request '%' Buffer Overflow Lets Remote Users Execute Arbitrary Code. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.gulftech.org:
www.idefense.com: News www.techworld.com: Trend Micro bug down to over-quick testing. Read more
www.securitypronews.com:
www.computerworld.com:
www.computerworld.com:
www.webpronews.com:
www.bitdefender.com:
searchsecurity.techtarget.com:
www.broadbandreports.com:
www.eweek.com:
www.techworld.com:
www.techworld.com:
comment.zdnet.co.uk:
|
25 April 2005 Guides, Papers, etc www.benedelman.org: Misleading Installations of the Week: PacerD, and Claria's Dope Wars. Read more
www.preferredcomputers.com:
www.eecis.udel.edu: News www.usatoday.com: Microsoft expected to ignite 64-bit computing. Read more
mdn.mainichi.co.jp:
www.yomiuri.co.jp:
news.zdnet.co.uk:
www.ecommercetimes.com:
www.usatoday.com:
www.securitynewsportal.com:
uk.builder.com:
|
24 April 2005 Guides, Papers, etc www.rootkit.com: Hide user mode debuggers from executables with debbuger detection. Read more
www.vulndev.org:
www.acm.uiuc.edu: Vulnerabilities & Exploits www.frsirt.com: KDE Kommander Arbitrary Code Execution Vulnerability. Read more
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.securitytracker.com:
www.securitytracker.com: News www.zone-h.org: Hushmail.com defaced by means of DNS redirection UPDATED. Read more
www.pcworld.com:
www.securitypronews.com:
www.syracuse.com:
infotech.indiatimes.com:
|
23 April 2005 Guides, Papers, etc www.cs.berkeley.edu: The Threat of Internet Worms. Read more
www.viruslist.com:
www.securitypipeline.com: Vulnerabilities & Exploits www.securitytracker.com: ASP Nuke Input Validation Holes Permit SQL Injection and Cross-Site Scripting Attacks. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.theregister.co.uk: MP3 zapping malware worms onto P2P network. Read more
news.zdnet.com:
www.channelregister.co.uk:
www.theregister.co.uk:
news.zdnet.com:
news.zdnet.com:
www.eweek.com:
www.thewhir.com:
news.zdnet.com:
www.techweb.com:
news.com.com:
|
22 April 2005 Guides, Papers, etc recon.cx: REcon 2005. Read more
www.eecs.umich.edu: Vulnerabilities & Exploits www.securitytracker.com: phpBB Auction Mod Lets Remote Users Inject SQL Commands and Determine the Installation Path. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org:
www.debian.org: News www.securityfocus.com: Privacy watchdog warns job seekers to beware. Read more
www.cyprus-mail.com:
www.theregister.co.uk:
www.newsfactor.com:
www.theregister.co.uk:
www.securityfocus.com:
www.vnunet.com:
www.vnunet.com:
|
21 April 2005 Updated: Trojan News March
Guides, Papers, etc
www.pakcon.org:
informit.com:
www.bluesecurity.com:
www.securityfocus.com:
www.eweek.com: Vulnerabilities & Exploits www.securitytracker.com: MPlayer MMST and RTSP Buffer Overflows Let Remote Users Execute Arbitrary Code. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com: News www.vnunet.com: Bank attack used key-loggers costing just �20. Read more
www.eweek.com:
www.theregister.co.uk:
www.newsfactor.com:
itvibe.com:
www.eweek.com:
www.eweek.com:
www.eweek.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.cellular-news.com:
www.eweek.com:
|
20 April 2005 Updated: Trojan News March
Guides, Papers, etc
www.astalavista.com:
www.exploitx.com:
www.professionalsecurity.co.uk:
www.securitypark.co.uk: Tools: ophcrack.sourceforge.net: Ophcrack version 2.0 is a windows password cracker based on the faster time-memory trade-off using rainbow tables. Read more Vulnerabilities & Exploits www.securitytracker.com: Sun Solaris May Let Local Users Hijack Non-Privileged Port Services. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.greymagic.com:
www.debian.org:
www.debian.org: News www.theregister.co.uk: Sober worm shakes Windows security. Read more
news.zdnet.co.uk:
www.wired.com:
news.com.com:
www.vnunet.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.theinquirer.net:
australianit.news.com.au:
news.com.com:
news.com.com:
www.pcworld.com:
|
19 April 2005 Updated: Trojan News March
Guides, Papers, etc
www.astalavista.com:
www.astalavista.com:
arxiv.org:
www.oracle.com:
nzeka-labs.com: Vulnerabilities & Exploits www.idefense.com: McAfee Internet Security Suite 2005 Insecure File Permission Vulnerability. Read more
www.debian.org:
www.mikx.de: News www.theregister.co.uk: Save us from spam. Read more
www.techtree.com:
news.com.com:
news.com.com:
www.computerworld.com:
www.computerworld.com:
|
18 April 2005 Updated: Trojan News March
Guides, Papers, etc
www.simson.net: Vulnerabilities & Exploits www.securiteam.com: Vulnerabilities in TCP/IP Allow Remote Code Execution and DoS (MS05-019, Exploit). Read more
www.securiteam.com:
www.securiteam.com:
remahl.se: News www.usatoday.com: Hacker invades Anchorage airport Web site. Read more
news.zdnet.com:
news.zdnet.com:
www.vnunet.com:
www.earthtimes.org:
|
17 April 2005 Updated: Trojan News March
Guides, Papers, etc
www.astalavista.com:
www.astalavista.com: Vulnerabilities & Exploits www.securitytracker.com: Firefox Sidebar '_search' Processing Error Lets Remote Users Execute Arbitrary Code. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.frsirt.com:
www.frsirt.com:
www.debian.org: News www.webpronews.com: Mozilla Updates For Security. Read more
www.keralanext.com:
www.infoworld.com:
publications.mediapost.com:
www.zwire.com:
|
16 April 2005 Guides, Papers, etc www.securityfocus.com: Introduction to Spyware Keyloggers. Read more
www.macnewsworld.com:
www.pcworld.com:
www.securityfocus.com:
informationweek.com:
Vulnerabilities & Exploits xforce.iss.net: CA BrightStor ARCServe Backup Remote Compromise. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News news.zdnet.co.uk: Microsoft silent over IP vulnerability claims. Read more
www.eweek.com:
informationweek.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
www.pcworld.com:
software.silicon.com:
www.vnunet.com:
www.vnunet.com:
thebosh.com:
|
15 April 2005 Guides, Papers, etc www.securityfocus.com: Privacy From the Trenches. Read more
www.ics.forth.gr:
www.vnunet.com: Vulnerabilities & Exploits www.securitytracker.com: Axel Buffer Overflow in Processing HTTP Location Values Lets Remote Users Execute Arbitrary Code. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.frsirt.com
www.frsirt.com
www.frsirt.com
www.securiteam.com:
www.securiteam.com:
www.hyperdose.com:
www.debian.org:
www.security.nnov.ru: News www.reuters.com: Worm Prompts Temporary Shutdown of Reuters Messaging. Read more
news.zdnet.co.uk:
news.zdnet.co.uk:
news.bbc.co.uk:
www.theregister.co.uk:
news.com.com:
news.zdnet.co.uk:
itvibe.com:
|
14 April 2005 Guides, Papers, etc www.antiphishing.org: Vulnerability of First-Generation Digital Certificates and Potential for Phishing Attacks and Consumer Fraud. Read more
www.astalavista.com: Vulnerabilities & Exploits www.securitytracker.com: IBM Domino Server Buffer Overflow in Date/Time Field Lets Remote Users Execute Arbitrary Code. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.geotrust.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org:
www.debian.org: News www.theregister.co.uk: Eight patches - five critical - in MS April patch batch. Read more
australianit.news.com.au:
www.theregister.co.uk:
www.theregister.co.uk:
news.zdnet.com:
www.zdnet.com.au:
www.theregister.co.uk:
www.vnunet.com:
www.zdnet.com.au:
www.pcauthority.com.au:
www.zdnet.com.au:
australianit.news.com.au:
|
13 April 2005 Guides, Papers, etc A Methodology for Detecting New Binary Rootkit Exploits. Read more
www.arl.wustl.edu:
www.windowsitpro.com:
www.astalavista.com:
www.geotrust.com: Tools: www.eeye.com: eEye Launches Free Retina WiFi Scanner to Address the Growing Business Concern of Wireless Network Security. Read more Vulnerabilities & Exploits www.frsirt.com: Microsoft Word Remote Code Execution Vulnerabilities (MS05-023). Read more
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com: News Microsoft Security Bulletin MS05-002 Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711). Read more
www.zdnet.com.au:
www.zdnet.com.au:
www.zdnet.com.au:
www.zdnet.com.au:
www.isp-planet.com:
|
12 April 2005 Guides, Papers, etc Computer Security Mexico 2005 Palacio de Mineria, May 26th - May 27th, 2005. Read more
www.cise.ufl.edu:
www.security-assessment.com:
www.security-assessment.com:
www.security-assessment.com:
www.security-assessment.com:
www.security-assessment.com:
www.security-assessment.com:
www.security-assessment.com:
www.theregister.co.uk: Vulnerabilities & Exploits www.frsirt.com: CA BrightStor ARCserve Backup Remote Buffer Overflow Vulnerability. Read more
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
secunia.com: News www.securityfocus.com: Campaign seeks to defang Rafa's hacker image. Read more
www.securityfocus.com:
www.infoworld.com:
security.itworld.com:
www.nwfusion.com:
www.silicon.com:
www.pcworld.com:
www.microsoft.com:
www.theregister.co.uk:
www.theregister.co.uk:
|
11 April 2005 Guides, Papers, etc www.eweek.com: Tales of a Professional Social Engineer. Read more
www.eweek.com:
www.exploitx.com:
www.net-security.org:
www.av-comparatives.org:
www.cise.ufl.edu:
www.securitydocs.com:
www.zone-h.org: Vulnerabilities & Exploits www.securiteam.com: Microsoft Multiple E-Mail Client Address Spoofing Vulnerability. Read more
www.securiteam.com:
www.securiteam.com: News www.zdnet.com.au: Virus blocks access to antivirus Web sites. Read more
www.crime-research.org:
www.zdnet.com.au:
www.eweek.com:
|
10 April 2005 Guides, Papers, etc www.hackerhighschool.org: Hacker Highschool. LESSON 1 BEING A HACKER. Read more Hacker Highschool. LESSON 2. BASIC COMMANDS IN LINUX AND WINDOWS. Read more Hacker Highschool. LESSON 3 PORTS AND PROTOCOLS. Read more Hacker Highschool. LESSON 4 SERVICES AND CONNECTIONS. Read more Hacker Highschool. LESSON 5 SYSTEM IDENTIFICATION. Read more Hacker Highschool. LESSON 6 MALWARE. Read more Hacker Highschool. LESSON 7 ATTACK ANALYSIS. Read more Hacker Highschool. LESSON 8 DIGITAL FORENSICS. Read more Hacker Highschool. LESSON 9 E-MAIL SECURITY. Read more Hacker Highschool. LESSON 11 PASSWORDS. Read more
www.securityfocus.com:
security.ucdavis.edu:
www.zone-h.org:
en.wikipedia.org: Vulnerabilities & Exploits www.securitytracker.com: File Upload Script 'up.php' for phpBB Lets Remote Users Upload Arbitrary Files. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
zone-h.org:
zone-h.org:
zone-h.org: News news.com.com: Google adds satellite images to maps. Read more
news.com.com:
www.washingtonpost.com:
www.jpost.com:
www.denverpost.com:
www.nationmultimedia.com:
www.thewhir.com:
|
09 April 2005 Guides, Papers, etc www.peterszor.com: EPOC EPOCalypse alypse NOW! �The volume of malicious code seems to be growing quicker than ever.� Read more
www.astalavista.com:
www.astalavista.com: Vulnerabilities & Exploits www.securitytracker.com: AN HTTP Server 'cmdIS.DLL' Buffer Overflow Lets Local Users Execute Arbitrary Code and Remote Users Conduct Cross-Site Scripting Attacks. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.theregister.co.uk: Trojan leaps from bogus Windows Update site. Read more
news.zdnet.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
www.smh.com.au:
news.zdnet.co.uk:
|
08 April 2005 SilentDoor is a connectionless, PCAP-based backdoor for linux that uses packet sniffing to bypass netfilter. It sniffs for UDP packets on port 53, runs each packet against a decryption scheme, if the packet validates than it runs a command. Can be masked to look like any other process. Remote command utility included. Read more Guides, Papers, etc tracking-hackers.evilcoder.org: The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. Read more
www.networkcomputing.com:
searchsecurity.techtarget.com: Vulnerabilities & Exploits www.securitytracker.com: PopUp Plus Miranda IM Plugin Buffer Overflow Lets Remote Users Execute Arbitrary Code. read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.securityfocus.com: DNS attacks attempt to mislead consumers. Read more
www.theregister.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
www.vnunet.com:
news.zdnet.co.uk:
www.eeproductcenter.com:
|
07 April 2005 Guides, Papers, etc www.securityfocus.com: Defeating Honeypots: System Issues, Part 2. Read more
www.csoonline.com:
www.cs.purdue.edu:
www.eweek.com:
www.pulltheplug.org: Vulnerabilities & Exploits www.securitytracker.com: Cisco IOS IKE Authentication Bugs Let Remote Users Bypass Xauth Authentication to Gain Access to Hosts and Resources. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com: News news.zdnet.com: Trojan horse takes down smart phones. Read more
www.vnunet.com:
www.theregister.co.uk:
www.pcworld.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
www.iht.com:
australianit.news.com.au:
www.theregister.co.uk:
news.zdnet.com:
www.vnunet.com:
searchsecurity.techtarget.com:
software.silicon.com:
www.cbronline.com:
|
06 April 2005 Guides, Papers, etc www.microsoft.com: Technical Overview of Windows Server 2003 Service Pack 1 (SP1). Read more
www.securityfocus.com:
www.microsoft.com:
isc.sans.org:
www.nhtcu.org:
www.security.org.sg:
www.security.org.sg
www.whatthehack.org Datenbank Rootkits (English Language) Tools: www.security.org.sg: Win2K/XP SDT Restore 0.2 (Proof-Of-Concept) Win32 Kernel Rootkits modify the behaviour of the system by Kernel Native API hooking. This technique is typically implemented by modifying the ServiceTable entries in the Service Descriptor Table (SDT). This allows kernel rootkits to hide files, processes, and to prevent process termination. This proof-of-concept tool demonstrates the possibility of defeating such rootkits by removing Kernel Native APIs hooks and restoring the SDT back to its original state. Read more
www.security.org.sg:
www.security.org.sg:
www.security.org.sg: Vulnerabilities & Exploits www.ngssoftware.com: Sybase ASE Multiple Security Issues. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com
www.securiteam.com
www.securiteam.com
News www.theregister.co.uk: Google and Yahoo! accused of click fraud collusion. Read more
home.businesswire.com:
www.theregister.co.uk:
www.theregister.co.uk:
news.zdnet.co.uk:
www.detnews.com:
www.smh.com.au:
www.newsfactor.com:
www.theregister.co.uk:
|
05 April 2005 Guides, Papers, etc Datenbank Rootkits (German Language)
www.exploitx.com:
www.exploitx.com: Tools: red-database-security.com: Repscan is a repository integrity scanner for Oracle databases. You can use repscan to find database rootkits. Read more Vulnerabilities & Exploits www.securitytracker.com: MailEnable Unspecified Bugs in IMAP and SMTP Services Let Remote Users Deny Service. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
aluigi.altervista.org:
class101.org:
News www.theregister.co.uk: Join Microsoft. Save the world. Read more
news.com.com:
www.cio-today.com:
www.pcauthority.com.au:
www.theregister.co.uk:
www.smh.com.au:
www.theregister.co.uk:
www.theregister.co.uk:
www.exploitx.com:
news.zdnet.co.uk: |
04 April 2005 Guides, Papers, etc www.detnews.com: Hot spots for hackers: Wireless networks. Read more
nwc.securitypipeline.com: News www.zdnet.com.au: MSN Messenger spreads worm, not love. Read more
www.bizjournals.com:
www.vnunet.com:
www.pcmag.com:
www.zdnet.com.au:
www.arnnet.com.au:
www.bsudailynews.com:
|
03 April 2005 Guides, Papers, etc www.computerworld.com: Log-on type codes revealed. Read more
www.computerworld.com: Tools: AFX Rootkit 2005 by Aphex This program patches Windows API to hide certain objects from being listed. Current Version Hides: a) Processes b) Handles c) Modules d) Files & Folders e) Registry Keys & Values f) Services g) TCP/UDP Sockets h) Systray Icons Vulnerabilities & Exploits www.securitytracker.com: SiteEnable Lets Remote Users Inject SQL Commands and Conduct Cross-Site Scripting Attacks. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News nwc.systemsmanagementpipeline.com: March's Bug Story: Old Worms and Phishing in the Office. Read more
www.computerworld.com:
news.zdnet.co.uk:
news.zdnet.co.uk:
|
02 April 2005 Guides, Papers, etc www.theregister.co.uk: Hardware is secure (false). Read more Honeycomb. Creating Intrusion Detection Signatures Using Honeypots. Read more
www.honeyd.org:
survey.mailfrontier.com:
hackaholic.org: Vulnerabilities & Exploits www.hexview.com: Microsoft Jet DB engine vulnerabilities. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.frsirt.com:
www.frsirt.com:
www.debian.org:
www.debian.org:
www.caughq.org: News www.securitypipeline.com: CoolWebSearch, Dubbed Adware's "Ebola," Tops Spyware Threat List. Read more
www.pcworld.com:
news.zdnet.co.uk:
www.securitypipeline.com:
www.theregister.co.uk:
www.theregister.co.uk:
|
01 April 2005 Guides, Papers, etc www.benedelman.org: Threats Against Spyware Detectors, Removers, and Critics Threats and demands that certain software providers have made to those who detect, remove, and otherwise write about their products. Read more
www.computerworld.com: Tools: hxdef.czweb.org: Hacker defender seems to have released a new version of his rootkit (available for 'only' 390 euros). Not (yet) detected by any of the popular rootkit detectors ... Read more
www.cr0.net:
www.fiddlertool.com: Vulnerabilities & Exploits www.securitytracker.com: Linux Kernel Deadlock Error in futex Functions Let Local Users Deny Service. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.securiteam.com: News news.com.com: Bug hunter gets bounty from Mozilla. Read more
news.com.com:
www.infoworld.com:
www.zdnet.com.au:
www.zdnet.com.au:
www.securitypark.co.uk:
www.securitypark.co.uk:
www.vnunet.com:
www.vnunet.com:
www.vnunet.com:
news.com.com:
|
Copyright� MegaSecurity.org