Home News Archive Translate Traducen |
News May 2005 |
31 May 2005 Guides, Papers, etc www.pcworld.com: Security Tips: Identify Malware Hiding in Windows' System Folders. Read more
An Investigation of a Compromised Host on a Honeynet Being Used to Increase the
Security of a Large Enterprise Network Vulnerabilities & Exploits www.frsirt.com: PeerCast Malformed URL Remote Format String Vulnerability. Read more
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.securiteam.com:
lists.grok.org.uk:
pb.specialised.info: News www.ctv.ca: Many unaware of browser-security link: study. Read more
management.silicon.com:
www.haaretz.com:
news.softpedia.com:
www.theinquirer.net:
australianit.news.com.au:
www.newswireless.net: |
30 May 2005 Guides, Papers, etc www.enterprisenetworkingplanet.com: Botnets: Who Really "0wns" Your Computers. Read more
nwc.securitypipeline.com:
dot.kde.org:
dot.kde.org:
www.securityfocus.com: HONEYNETS: FOUNDATIONS FOR THE DEVELOPMENT OF EARLY WARNING INFORMATION SYSTEMS. Read more Vulnerabilities & Exploits www.securityfocus.com: Microsoft Internet Explorer Object Embedding Denial of Service Vulnerability. Read more
www.securityfocus.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.frsirt.com:
www.debian.org:
www.cyber-army.org: News www.wired.com: Israelis Nab Computer Spies. Read more
www.zdnet.com.au:
www.chinadaily.com.cn:
www.bankofamerica.com:
weblogs.mozillazine.org:
www.vnunet.com:
www.theinquirer.net:
www.wired.com: |
29 May 2005 Guides, Papers, etc www.cyber-army.org: The Art of Rootkits. Read more
www.cyber-army.org: Anti-Malware Tools: Intrusion Detection Systems by Martin Overton. Read more Tools: www.securityguidance.com: The Microsoft Security Risk Self-Assessment Tool. Read more Vulnerabilities & Exploits www.frsirt.com: Microsoft Internet Explorer Denial of Service Vulnerabilities. Read more
www.securityfocus.com:
www.securityfocus.com:
www.frsirt.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.osvdb.org:
www.osvdb.org:
News www.it-observer.com: Microsoft Launched Anti-Spam Tools. Read more
www.mb.com.ph:
www.theregister.co.uk:
nwc.systemsmanagementpipeline.com:
www.bayoubuzz.com:
www.hindu.com:
|
28 May 2005 Guides, Papers, etc www.securityfocus.com: Bluetooth Security Review, Part 2. Read more Honeypot-based Forensics by F. Pouget, M. Dacier. Read more Vulnerabilities & Exploits securitytracker.com: phpStat 'setup.php' Lets Remote Users Modify the Administrative Password. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
News apnews.myway.com: CIA's Internet War Exercise Wraps Up Today. Read more
apnews.myway.com:
www.theregister.co.uk:
www.eweek.com:
www.theregister.co.uk:
www.f-secure.com:
cities.expressindia.com:
news.com.com:
www.informationweek.com:
news.zdnet.co.uk:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
|
27 May 2005 Guides, Papers, etc searchsecurity.techtarget.com: Spyware vs. viruses: Two different fights. Read more
www.kristianhermansen.com:
websearch.about.com: White Paper: Honeypots. Read more Tools: Virtual Privacy Machine A 128MB USB memory stick that has a complete Linux OS on it. Also, it has been preconfigured to tunnel all traffic through Tor. This means that any thing you do will not originate from your IP. It makes you completely anonymous. Read more Vulnerabilities & Exploits securitytracker.com: HP-UX Trusted Systems Grant Access to Remote Users. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org:
xforce.iss.net: News news.zdnet.com: ZombieMeter keeps track of hacked PCs. Read more
www.redherring.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
www.smh.com.au:
www.theregister.co.uk:
|
26 May 2005 Guides, Papers, etc www.securityfocus.com: Is Deleting Spyware A Crime? Read more
www.astalavista.com:
www.astalavista.com: Superworms and Cryptovirology: a Deadly Combination. Read more Vulnerabilities & Exploits securitytracker.com: Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code. Read more
www.finjan.com:
www.debian.org:
www.zataz.net:
securitytracker.com:
securitytracker.com:
securitytracker.com: News news.com.com: Experts: Zombies ousting viruses. Read more
www.theregister.co.uk:
www.pcworld.idg.com.au:
www.theregister.co.uk:
www.theregister.co.uk:
www.microscope.co.uk:
www.theregister.co.uk:
daily.stanford.edu:
news.enquirer.com:
www.computerweekly.com:
www.wired.com:
www.thecouriermail.news.com.au:
news.zdnet.com:
www.eweek.com:
|
25 May 2005 Guides, Papers, etc www.securityfocus.com: Witty worm flaws reveal source, initial targets. Read more
www.icsi.berkeley.edu: Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event by Abhishek Kumar, Vern Paxson, Nicholas Weaver. Read more Tools: www.infoworld.com: AJAX breathes new life into Web apps. Read more Vulnerabilities & Exploits www.websensesecuritylabs.com: Malicious Website / Malicious Code: Cyber Extortion Attack. Read more
secunia.com:
www.rem0te.com:
secway.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.websensesecuritylabs.com:
www.websensesecuritylabs.com:
News news.com.com: Worm, phishing scam hit IM services. Read more
news.com.com:
www.zdnet.com.au:
news.com.com:
news.com.com:
news.com.com:
www.theinquirer.net:
news.com.com:
www.microscope.co.uk:
www.newsfactor.com:
news.com.com:
www.theregister.co.uk:
www.microscope.co.uk:
www.microscope.co.uk:
www.microscope.co.uk:
|
24 May 2005 Guides, Papers, etc Polygraph: Automatically Generating Signatures for Polymorphic Worms. Read more Vulnerabilities & Exploits www.hackingspirits.com: Defeating WGA (Windows Genuine Advantage) Validation. Download
www.frsirt.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com: News www.eweek.com: Exploit Allows Windows XP Piracy. Read more
news.com.com:
www.smh.com.au:
news.com.com:
news.com.com:
www.theregister.co.uk:
www.zdnet.com.au:
|
23 May 2005 Guides, Papers, etc www.benedelman.org: Intermediaries' Role in the Spyware Mess. Read more
Adaptive and Resilient Computing Security Workshop (ARCS2005)
www.net-security.org:
www.oreillynet.com:
www.windowsdevcenter.com: Deworming the Internet. Read more Vulnerabilities & Exploits securitytracker.com: Gentoo webapp-config Unsafe Temporary File Lets Local Users Gain Elevated Privileges. Read more
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News www.microscope.co.uk: Student issues service pack 2 for Windows 98 SE. Read more
www.terra.net.lb:
www.businessweek.com:
www.microscope.co.uk:
www.zdnet.com.au:
news.zdnet.co.uk:
www.zdnet.com.au:
www.zdnet.com.au:
www.whatthehack.org:
|
22 May 2005 Shell_Me 0.6, Cmd-line Backdoor by Eb0La
Guides, Papers, etc NoSEBrEaK - Defeating Honeynets. Read more Tools: www.cr0.net: Recovering Windows Password Cache Entries. Read more
fileforum.betanews.com: Vulnerabilities & Exploits www.securitytracker.com: MailScanner May Fail to Report Viruses in Zip Files. Read more
www.milw0rm.com:
www.frsirt.com:
www.frsirt.com:
www.milw0rm.com: News nwc.personaltechpipeline.com: Aggressive Sober.p Worm To Strike Monday. Read more
www.microsoft-watch.com:
www.vnunet.com:
www.vnunet.com:
bink.nu:
|
21 May 2005 Guides, Papers, etc Hacker Hunters An elite force takes on the dark side of computing. Read more
www.windowsdevcenter.com:
www.securityfocus.com: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. Read more Vulnerabilities & Exploits securitytracker.com: Groove Virtual Office Lets Remote Users Execute Arbitrary Code and Discloses Information to Local Users. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.theregister.co.uk: Sober reloaded. Read more
www.eweek.com:
informationweek.com:
news.zdnet.com:
www.chron.com:
www.theregister.co.uk:
news.zdnet.com:
www.startribune.com:
www.theregister.co.uk:
www.vnunet.com:
|
www.computerworld.com:
Book Excerpt. The Criminal Face of the Internet Age. Read more
Worms of the future. Trying to exorcise the worst. Read more
www.priestmaster.org:
How to circumvent keyloggers ? Read more
www.developer.com:
On the Security of PHP. Part 1 Part 2
www.securityfocus.com:
Sit Back and React. As the security industry moves more mainstream, it's becoming stagnant due to a lack of vision. Who will lead the charge? Read more
www.computerworld.com:
What you need to know before migrating procurement apps to the Web. Read more
Tools:
Vulnerabilities & Exploits
securitytracker.com:
ExtremeWare XOS Lets Remote Authenticated Administrators Gain Access to the Operating System on BlackDiamon Switches. Read more
securitytracker.com:
Novell ZENworks Remote Management Buffer Overflows in Authentication Protocol Let Remote Users Execute Arbitrary Code. Read more
securitytracker.com:
Cisco MGX WAN Switches TCP/IP Timestamp Option Error Lets Remote Users Deny Service. Read more
securitytracker.com:
Cisco AP35/AP1200 TCP/IP Timestamp Option Error Lets Remote Users Deny Service. Read more
securitytracker.com:
Cisco CSS11000 TCP/IP Timestamp Option Error Lets Remote Users Deny Service. Read more
securitytracker.com:
Cisco SN5400 TCP/IP Timestamp Option Error Lets Remote Users Deny Service. Read more
www.securiteam.com:
Bellmail Race Condition Vulnerability (Exploits). Read more
www.securiteam.com:
Invision Power Board SQL Injection Vulnerability (member_id, Exploit). Read more
www.cybertrion.com:
Security issue in Microsoft Outlook. Read more
www.securiteam.com:
BakBone NetVault Remote Heap Buffer Overflow (clientname). Read more
www.securiteam.com:
cdrdao Insecure File Handling (Exploit). Read more
www.debian.org:
DSA-725-1 ppxp -- missing privilege release. Read more
News
www.theregister.co.uk:
UK banks ignore security audit findings. Read more
www.washingtonpost.com:
Paris Hilton Hack Started With Old-Fashioned Con. Read more
www.eeproductcenter.com:
Feds Investigating LexisNexis Hacking. Read more
www.eweek.com:
Fake Microsoft Patch Triggers Virus Attack. Read more
www.computerworld.com:
Popular Japanese Web site hit by major hack. Read more
www.computerworld.com:
Data theft involving four banks could affect 500,000 customers. Read more
www.internetweek.com:
Vigilantes Mutilate Phishing Sites. Read more
www.startribune.com:
Hackers shifting from play to shadowy high-tech theft. Read more
news.zdnet.com:
VeriSign to put more backbone into the Net. Read more
news.zdnet.co.uk:
Software makers ignoring anti-piracy technology in favour of sales. Read more
19 May 2005 Guides, Papers, etc www.wired.com: What Search Sites Know About You. Read more
www.securityfocus.com: Attack Processes found on the Internet by Marc Dacier, Fabien Pouget, Herv� Debar. Read more Manipulating Microsoft SQL Server Using SQL Injection by Cesar Cerrudo. Read more Tools: www.gfi.com: GFI Network Server Monitor is a network monitor that enables administrators to scan the network for failures or irregularities automatically. With GFI Network Server Monitor, you can identify issues and fix unexpected conditions before your users (or managers) report them to you! Provides automatic network monitoring and alerting for three servers. Read more
enterprisesecurity.symantec.com:
www.securitylab.ru:
www.red-cliff.com: Vulnerabilities & Exploits www.securitytracker.com: avast! antivirus May Fail to Detect Certain Viruses. Read more
www.cybertrion.com:
www.securityfocus.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org: News informationweek.com: Bogus Microsoft Security Update Circulates. Read more
www.betanews.com:
www.itweb.co.za:
www.newsfactor.com:
www.theregister.co.uk:
www.theinquirer.net:
www.newsfactor.com:
www.theregister.co.uk:
www.wired.com:
www.theinquirer.net:
www.newsfactor.com:
|
18 May 2005 Guides, Papers, etc Computer Security Mexico 2005 "11th Years celebrating Computer Security Mexico". Read more
Know your Enemy: Phishing
Permission to Simplify
www.eweek.com: The Effect of Infection Time on Internet Worm Propagation by Erika Rice. Read more Vulnerabilities & Exploits securitytracker.com: Fastream NETFile Server PORT Command Address Validation Flaw Lets Remote Users Deny Service. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com: News www.securityfocus.com: Microsoft looks to "monkeys" to find Web threats. Read more
www.theregister.co.uk:
www.networkworld.com:
www.smh.com.au:
www.theregister.co.uk:
www.theregister.co.uk:
www.eweek.com:
www.eweek.com:
|
17 May 2005 Guides, Papers, etc www.webappsec.org: Web Security Interview Questions [DOC]. Read more How to Bypass Your Corporate Firewall Using SSH Tunneling by ~pingywon. Read more Vulnerabilities & Exploits www.securitytracker.com: Gurgens Guest Book Discloses Database and Passwords to Remote Users. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.benedelman.org: What's So Hot About Hotbar? Read more
sunbeltblog.blogspot.com:
www.trinidadexpress.com:
www.pcworld.idg.com.au:
www.theregister.co.uk
biz.yahoo.com:
www.net-security.org:
www.theregister.co.uk
www.sun-sentinel.com:
www.computerworld.com:
www.pcworld.idg.com.au:
www.ravallinews.com:
|
16 May 2005 Guides, Papers, etc Malicious Codes in Depth by Mohammad Heidari. Read more
Open Source Software in Schools Infosecurity Europe 2005 - First Issue of (IN)SECURE Magazine. Read more Vulnerabilities & Exploits www.securiteam.com: Gaim Stack Overflow (PoC). Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News www.zdnet.com.au: German hate-spam spread by Sober virus. Read more
www.theinquirer.net:
www.zdnet.com.au:
www.theregister.co.uk:
www.zdnet.com.au: |
15 May 2005 Guides, Papers, etc www.itunderground.org: IT Underground is an international conference dedicated to IT security issues. Read more
SPYWARE
www.securityfocus.com: Inoculating SSH Against Address-Harvesting Worms Read more News www.stuff.co.nz: Fear of copycat voicemail hackers. Read more
www.zdnet.com.au:
www.theregister.co.uk:
blog.searchenginewatch.com:
www.gcn.com:
www.cooltechzone.com:
informationweek.com: |
14 May 2005 Guides, Papers, etc seattletimes.nwsource.com: Better" firewalls require more-knowledgeable users. Read more
www.eeproductcenter.com: A Worst-Case Worm. Read more Tools: www.megaas.co.nz: Mega AS CAT (Cellular Authentication Token) is a unique low cost Two Factor Authentication (TFA) One Time Password (OTP) solution for secured access to remote servers via Internet, WiFi, VPN, Intranet, Other customized access methods. Read more Vulnerabilities & Exploits securitytracker.com: Movable Type Cookie Authentication Flaw Lets Remote Users Gain Access. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.theregister.co.uk: Firefox loses its shine. Read more
www.post-gazette.com:
www.cnn.com:
www.wired.com:
www.computerworld.com:
news.zdnet.co.uk:
www.xbitlabs.com:
news.zdnet.co.uk:
news.com.com:
www.wired.com:
news.zdnet.co.uk: |
13 May 2005 Guides, Papers, etc www.dimva.org: Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Read more
www.securityfocus.com:
www.gerv.net: Vulnerabilities & Exploits securitytracker.com: Cisco Firewall Services Module Filtering ACL Error May Let Remote Users Bypass the Filtering. Read more
securitytracker.com:
securitytracker.com:
isec.pl:
remahl.se: News news.com.com: Flaw found in VPN crypto security. Read more
67.19.9.2:
www.theregister.co.uk:
www.computerworld.com:
www.techspot.com:
www.stuff.co.nz:
67.19.9.2:
www.channelregister.co.uk:
www.net4nowt.com:
itvibe.com:
informationweek.com/:
news.com.com:
www.theregister.co.uk:
news.com.com: |
12 May 2005 Guides, Papers, etc www.securityfocus.com: Web Browser Forensics, Part 2. Read more
nms.csail.mit.edu:
www.astalavista.com: Detecting Honeypots and other suspicious environments. Read more Reverse Engineering in Computer Applications. Read more Vulnerabilities & Exploits securitytracker.com: Windows Media Player License Acquisition Feature May Let Remote Users Redirect Users to Arbitrary Web Pages. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News digital-lifestyles.info: Windows Mobile 5.0 Unveiled By Microsoft. Read more
www.theregister.co.uk:
informationweek.com:
www.theregister.co.uk:
news.zdnet.co.uk:
www.theregister.co.uk:
www.wired.com:
www.computerworld.com.au:
www.computerworld.com.au:
www.computerworld.com.au:
www.computerworld.com.au:
|
11 May 2005 Guides, Papers, etc Lessons from Virus Developers: The Beagle Worm History Through April 24, 2004 by Jason Gordon . Read more
www.microsoft.com:
www.oreilly.com:
Tools: TRIPP is a utility to rewrite outgoing IP packets. It can be used to perform various tasks, such as passive os fingerprint spoofing, test firewall staeful inspection, test deep packet inspection software, evade weak IDS/IPS via ip fragmentation (like fragroute), generate network anomaies, packet injection and more. Read more Vulnerabilities & Exploits greyhatsecurity.org: Firefox Remote Compromise Technical Details. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News www.microsoft.com: Microsoft Security Bulletin Summary for May, 2005. Read more
www.microsoft.com:
www.securityfocus.com:
www.theregister.co.uk:
www.zdnet.com.au:
www.zdnet.com.au:
www.pcworld.idg.com.au:
www.zdnet.com.au:
www.scmagazine.com/:
www.theregister.co.uk:
www.zdnet.com.au:
www.zdnet.com.au:
www.zdnet.com.au:
www.pcworld.idg.com.au:
|
10 May 2005 Guides, Papers, etc NoSEBrEaK � Attacking Honeynets by Maximillian Dornseif, Thorsten Holz, Christian N. Klein. Read more
www.eweek.com:
Tools: www.openhids.com: open hids is a free, near-real time host intrusion detection system. the agent supports windows clients and servers, with other operating systems planned. Read more
www.wi-foo.com:
sourceforge.net: Vulnerabilities & Exploits www.securityfocus.com: Viruses can evade Sophos Anti-Virus. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org:
www.debian.org:
www.osvdb.org: News www.theregister.co.uk: Firefox exploit targets zero day vulns. Read more
www.securityfocus.com:
www.nctimes.com:
Phising Alert:
news.zdnet.co.uk:
www.eweek.com:
www.eweek.com:
www.theregister.co.uk:
www.infoanarchy.org:
news.zdnet.co.uk:
|
09 May 2005 Guides, Papers, etc www.computerworld.com: Book (Excerpt). Chapter 10: The Criminal Face of the Internet Age. Read more A System to Support the Analysis of Antivirus Products' Virus Detection Capabilities by Marko Helenius. Read more Using Predators to Combat Worms and Viruses: A Simulation-Based Study by Ajay Gupta, Daniel C. DuVarney. Read more
www.pcworld.com: Vulnerabilities & Exploits secunia.com: Mozilla Firefox Two Vulnerabilities. Read more
www.securitylab.net:
www.frsirt.com:
secunia.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News www.taipeitimes.com: British member of global hacker syndicate sent to jail. Read more
www.computerworld.com.au:
www.financialexpress.com:
itvibe.com:
www.crn.com:
www.computerworld.com.au:
www.computerworld.com.au:
nwc.securitypipeline.com:
|
08 May 2005 Guides, Papers, etc packetstormsecurity.org: Astalavista Group Security Newsletter Issue 15 - 30 March 2005. Read more
www.ncasia.com:
www.geek.com:
www.ncasia.com: Tools: www.lantricks.com: LanSpy � network security scanner. If you want to know who works on a remote computer, what kind of OS is installed on a remote computer or you are just interested when this computer was startup, then you should use LanSpy. This program in few seconds will explore a remote computer and display the information that it was able to collect about it. Read more
www.hackerscenter.com: Vulnerabilities & Exploits www.frsirt.com: Mozilla Firefox "Web Features" Remote Code Execution Vulnerability. Read more
www.milw0rm.com:
www.milw0rm.com:
www.milw0rm.com: News www.gigaom.com: Google (NOT) Hacked? Just A DNS Glitch says Google. Read more
www.informationweek.com:
news.zdnet.co.uk:
|
07 May 2005 Guides, Papers, etc reviews.cnet.com: Why virus writers still do what they do. Read more
new.remote-exploit.org:
www.securityfocus.com:
seattletimes.nwsource.com:
www.giac.org: Tools: www.openhids.com: open hids is a free, near-real time host intrusion detection system. the agent supports windows clients and servers, with other operating systems planned. Read more
nzeka-labs.com/:
www.eweek.com: Vulnerabilities & Exploits www.guninski.com: 64 bit qmail fun by Georgi Guninski. Read more
new.remote-exploit.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.pcworld.com: Microsoft Revamps Security Hole Approach. Read more
www.vnunet.com:
msnbc.msn.com:
www.theregister.co.uk:
www.pcworld.com:
money.cnn.com:
www.vnunet.com:
www.pcworld.com:
www.vnunet.com:
www.vnunet.com:
|
06 May 2005 Trojan News April Guides, Papers, etc www.csoonline.com: How a Bookmaker and a Whiz Kid Took On an Extortionist � and Won. Read more
Spying on the spyware makers.
www.securityfocus.com:
news.com.com: Tools: www.cirt.dk: WebRoot is a bruteforce directory/file scanner, which looks for files and directories on a website which might contain interesting data, but which are not referenced anywhere on the site (for example, include-files and database files located under the webroot). Read more Vulnerabilities & Exploits securitytracker.com: RealPlayer Flaw in Processing an Unspecified File Type Lets Remote Users Execute Arbitrary Code. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News www.theregister.co.uk: Users untouched by mobile viruses despite hype. Read more
informationweek.com:
informationweek.com:
news.com.com:
www.newsfactor.com:
news.zdnet.co.uk:
informationweek.com:
|
05 May 2005 Trojan News April Guides, Papers, etc Reverse-Engineering Malware by Lenny Zeltser. Read more Poison Ivy Farmers: Virus Collections. Read more
The Decompilation Wiki.
www.technologyreview.com:
www.pcworld.com:
cyber.law.harvard.edu:
cyber.law.harvard.edu:
cyber.law.harvard.edu: Vulnerabilities & Exploits securitytracker.com: FishCart Input Validation Holes Permit SQL Injection and Cross-Site Scripting Attacks. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
aluigi.altervista.org: News www.theregister.co.uk: Spyware scumbags make $2bn a year. Read more
www.theinquirer.net:
www.vnunet.com:
www.benedelman.org:
www.sans.org:
www.computerworld.com.au:
www.linuxworld.com.au:
news.com.com:
www.arnnet.com.au:
news.com.com:
news.com.com:
news.zdnet.co.uk:
|
04 May 2005 Trojan News April
Guides, Papers, etc
www.windowsecurity.com:
www.itee.uq.edu.au:
engr.smu.edu:
blackhat.com:
engr.smu.edu:
engr.smu.edu:
engr.smu.edu:
engr.smu.edu: Phishing to Steal Your PC,Money, and Identity by Tom Chen. Read more
www.g-con.org: Tools: nzeka-labs.com: tHork FrameWork is an exploit framework that allows you to put all the exploits you want in a repertory in order to access them (with a search engine) whenever you want. Read more
www.rstack.org:
prdownloads.sourceforge.net: Vulnerabilities & Exploits securitytracker.com: Symantec Gateway Security ICMP Processing Error Lets Remote Users Deny Service. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org: News www.theregister.co.uk: World Cup worm gives Windows users the willies. Read more
news.com.com:
reviews.cnet.com: Fake PayPal in Spain. Warning!
news.com.com:
www.newsfactor.com:
news.com.com:
news.com.com:
www.nzherald.co.nz:
news.com.com:
www.theregister.co.uk:
www.vnunet.com:
|
03 May 2005 Trojan News April
Guides, Papers, etc
Tracking the Attacker
www.securityfocus.com: Vulnerabilities & Exploits www.securitytracker.com: Invision Power Board URL Parameter Input Validation Error Lets Remote Users Conduct Cross-Site Scripting Attacks. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.billingsgazette.com: Internet virus hunters live for chase. Read more
www.zdnet.com.au:
news.zdnet.co.uk:
www.chinatechnews.com:
www.newsfactor.com:
news.ft.com:
www.insanely-great.com:
www.securitypipeline.com:
|
02 May 2005 Trojan News April
Guides, Papers, etc
www.securitypipeline.com:
www.securitypipeline.com:
www.osnews.com: Vulnerabilities & Exploits www.securiteam.com: SNMPPd Format String Vulnerability (Exploit). Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News nwc.securitypipeline.com: Bagle Worm Is Evidence Of Underground Class Of Professional Criminal Programmers. Read more
australianit.news.com.au:
www.zdnet.com.au:
www.linuxworld.com.au:
www.securitypipeline.com:
|
01 May 2005 Guides, Papers, etc Raw Sockets. The Warning by Steve Gibson some Years ago: Why Windows XP will be the Exploitation Tool of Choice for Internet Hackers Everywhere. Read more
Raw Sockets. The Result:
www.zdnet.com.au:
www.zdnet.com.au:
www.interact-sw.co.uk: www.eweek.com: The State of New York vs. The Adware Mob. Read more Vulnerabilities & Exploits www.securitytracker.com: Kerio MailServer Administration Port Lets Remote Users Deny Service. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News www.sci-tech-today.com: Gates: Next Decade Will Bring 'New Wave of Innovation'. Read more
www.newsfactor.com:
www.thenewstribune.com:
www.eweek.com:
www.eweek.com:
news.zdnet.co.uk:
www.zdnet.com.au:
|
Copyright� MegaSecurity.org