Login

Username:

Password:

Remember me



Lost Password?

Register now!

Related Sponsor

     

(1) 2 »
EXPLOIT: PHP Nuke Users
Posted by Stuart Hurdis on 2005/4/27 9:07:32 (5579 reads)

For those of you using PHP Nuke:

More than half of our spam/blacklisting problems derive from PHP Nuke installs on our customers' websites. Older versions of PHP Nuke can be used to send out spam. There is nothing we can do for you to prevent this from happening. Only your cooperation will help us.

We ask that everyone make sure to use ONLY the latest version of PHP Nuke.
You can download it here:

  0   Article ID : 95
Wireless Attack/Defense Bible
Posted by kyoshiro mibu on 2005/2/22 22:39:18 (2967 reads)
Security

Click to see original Image in a new windowFor all you wannabe hacker/administrators:

Here's SWEET site I found which lays out almost every aspect of attack and defense of your wireless networks. It also lists hundreds of programs that may be useful for this venue as well as how to get them.

www.wi-foo.com

Keeping your lives interesting,
-Kyoshiro

  4   Article ID : 66
Quantum Encryption
Posted by kyoshiro mibu on 2005/2/21 17:22:05 (2714 reads)
Security

Click to see original Image in a new window

To save myself a lot of typing just check out this link:

eetimes.com

And read an amazing article about the future of encryption and where security is headed!

-Kyoshiro Mibu

  0   Article ID : 59
What is phishing?
Posted by kyoshiro mibu on 2005/2/21 15:59:02 (2731 reads)
Security

Hey guys, just thought I'd update you all as to what PHISHING really is and how you can watch out for it. If you want more info on this make sure to check out John's article on Firefox getting hit by phishers.
Click to see original Image in a new window

  0   Article ID : 57
Wi Fi: Beware of the "Evil Twin"
Posted by John Seymour on 2005/1/21 17:28:57 (2873 reads)

Click to see original Image in a new window At an upcoming event in London an IT security expert, an academic, and the UK's cyber crime unit will give a taste of some of the dangers of wireless networking.

The featured exploit is one that is dubbed "The Evil Twin." This is carried out by a malicious server acting as a legitimate WiFi access point, and blocking the legitimate one by using a stronger signal. So then users unknowingly log onto the malicious server and thereby opening themselves up to information hijacking in the way of passwords, bank transactions and whatever other personal and private information can be harvested.

  0   Article ID : 34
New Spam Tactic Disrupts DNS
Posted by John Seymour on 2005/1/11 3:19:12 (1202 reads)

Click to see original Image in a new window Spammers have a new trick to try to get around the recent "Can Spam" legislation.

Their new method involves sending mass mailings late at night from a domain that is not yet registered. Then early the next morning they register it. By doing this, spammers hope to avoid stiff CAN-SPAM fines through minimal exposure and visibility with a given domain. The ruse, they hope, makes them more difficult to find and prosecute.

But this method causes serious problems.

  0   Article ID : 31
FireFox: Gone Phishing Too
Posted by John Seymour on 2005/1/10 21:12:01 (1226 reads)

Click to see original Image in a new window Well last week it was reported that Internet Explorer was vulnerable to phishing attacks. Now it seems that it is FireFox's turn.

The problem according to reports from SecurityFocus and vnunet.com is the way that long subdomains and paths are not displayed correctly, which can be exploited to modify what is being displayed in the source field of the Download Dialog box.

  0   Article ID : 30
Microsoft Releases Computer Pest Programs
Posted by John Seymour on 2005/1/7 4:30:17 (1793 reads)

Click to see original Image in a new window
On Thursday January 6, 2005, Microsoft released two free computer pest programs.

Microsoft Windows operating system is a major target of most virus, worm and spyware proliferations. In an effort to boost the computer security of the Windows operating system, Microsoft first released Service Pack 2 (SP2) for Windows XP, which closed many security holes and made it easier for users to manage antivirus and firewall programs. SP2 however has not been enough, several new and dangerous holes have been found, patched, and exploited by virus infections since the release of SP2.

  3   Article ID : 26
IE: Gone Phishing
Posted by John Seymour on 2005/1/2 23:10:15 (1907 reads)

Click to see original Image in a new window

Again Internet Explorer is having vulnerability problems. A new phishing exploit has been discovered involving cross site scripting. According to the security company Secunia, Paul (no last name given) of Greyhats, a research group, has published a vulnerability that can spoof any website.

Quoting the ZDnet UK article snippet:

Quote:

Using the exploit, scammers are able to manipulate all versions of IE, including Windows XP SP2 -- the latest and most secure version of the browser -- and spoof the URL and SSL signature padlock located at the bottom of the browser screen.


  0   Article ID : 24
2004: Perhaps the End of an Era
Posted by John Seymour on 2004/12/31 23:30:42 (1688 reads)

Click to see original Image in a new window Well it is time to say good-bye to the year 2004. It was a very active year from a computer security perspective.

2004 may also mark the end, or at least a slowdown, in mass mailing worms. According to antivirus experts it seems as the crackers and teen scripters are changing. Instead of going for high profile mass disruption virus attacks, they are going for the money.

As quoted from an article in BBC.co.uk:

"One of the biggest changes of 2004 was the waning influence of the boy hackers keen to make a name by writing a fast-spreading virus, said Kevin Hogan, senior manager in Symantec's security response group.

Although teenage virus writers will still play around with malicious code, said Mr Hogan, 2004 saw a significant rise in criminal use of malicious programs.

The financial incentives were driving criminal use of technology, he said. :

  0   Article ID : 23
(1) 2 »



Maintain By NovaSmart Technology . Visit NovaSmart XOOPS Module Development Site

Related Sponsor

Bookmark and Share