Home News Archive Translate Traducen |
News June 2005 |
30 June 2005 Guides, Papers, etc www.benedelman.org: What Passes for "Consent" at 180solutions. Read more
www.gartner.com:
www.microsoft.com:
lufgi4.informatik.rwth-aachen.de:
www.niscc.gov.uk:
www.zone-h.org:
www.astalavista.com: Vulnerabilities & Exploits www.idefense.com: Clam AntiVirus ClamAV MS-Expand File Handling DoS Vulnerability. Read more
www.cisco.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.globetechnology.com: Hacker cracks Google software. Read more
www.vnunet.com:
www.securitypipeline.com:
www.vnunet.com:
www.asahi.com/:
www.crn.com:
www.infoworld.com:
www.infoworld.com:
www.informationweek.com:
www.techweb.com:
software.silicon.com:
ww.messagingpipeline.com:
www.infoworld.com:
www.infoworld.com:
www.infoworld.com:
www.terra.net.lb:
www.iol.co.za:
www.iol.co.za:
www.iol.co.za:
|
.
29 June 2005 Guides, Papers, etc www.eweek.com: Return of the Anti-Zombies. Read more
www.securityfocus.com: Tools: www.microsoft.com: Microsoft Shared Computer Toolkit for Windows XP (Beta). Read more Vulnerabilities & Exploits securitytracker.com Adobe Reader/Acrobat Lets Remote Users Execute Arbitrary Applications. Read more
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com News www.globetechnology.com: UConn finds hacking program on server. Read more
www.eweek.com:
software.silicon.com:
www.vnunet.com:
www.theregister.co.uk:
news.bbc.co.uk:
www.theregister.co.uk:
www.pocket-lint.co.uk:
www.thestreet.com:
www.capetimes.co.za:
techdirt.com:
news.bbc.co.uk:
news.bbc.co.uk:
|
.
28 June 2005 Guides, Papers, etc www.microsoft.com: Study Shows Windows Beats Linux on Security. Read more
www.securityfocus.com:
nwc.networkingpipeline.com:
www.astalavista.com: Browser Identification for web applications by Shreeraj Shah. Read more Tools: NERO utilizes state-of-the-art academic artificial intelligence research in order to demonstrate its effectiveness in a game environment. The game uses AI to allow simulated robotic agents to cope with changing environments and situations, and form adaptive tactical solutions. The end result is a game that adapts itself to the strategies desired by the player, while still allowing the AI-controlled entities to operate as autonomous agents. NERO introduces a new genre of video game that is only possible with machine learning technology: The player takes the role of trainer and teaches a team of novice soldiers the skills for battle. When sufficient skills have been acquired, players can take their teams to battle mode where their skills are tested against teams trained by other players. Read more
www.onlamp.com: Vulnerabilities & Exploits www.secnap.com: Vulnerability in DELL Windows XP Professional - default hidden Administrator account allows local Administrator access. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News today.reuters.com: Microsoft strengthens ties with Japan universities. Read more
www.tinysoftware.com:
go.reuters.com:
www.computerworld.com:
www.computerworld.com:
www.theregister.co.uk:
news.zdnet.com:
|
.
27 June 2005 Guides, Papers, etc www.nthworld.org: On the Virulence of Malware. Read more Vulnerabilities & Exploits securitytracker.com: TCP-IP Datalook Lets Local Users Deny Servic. Read more
www.milw0rm.com:
www.cyber-army.org:
www.cyber-army.org:
www.neowin.net:
News software.silicon.com: Hackers spread Microsoft attack flaw exploit. Read more
www.vnunet.com:
www.informationweek.com:
software.silicon.com:
nwc.securitypipeline.com:
nwc.securitypipeline.com:
www.infoworld.com:
www.bizjournals.com:
www.informationweek.com:
news.com.com:
|
.
26 June 2005 Guides, Papers, etc www.dozleng.com: Does your antispyware's real-time protection work? Read more
www.eweek.com:
www.informationweek.com: Active Honeypots. read more Vulnerabilities & Exploits www.frsirt.com: Microsoft Server Message Block (SMB) Remote Exploit (MS05-011). Read more News www.cyber-army.org: Indian cracks Microsoft's anti-piracy program Read more
informationweek.com:
www.computerweekly.com:
www.eweek.com:
www.islandpacket.com:
www.ftc.gov:
www.eweek.com:
www.islandpacket.com:
www.eweek.com:
www.eweek.com:
informationweek.com:
informationweek.com:
www.islandpacket.com:
|
.
25 June 2005 Guides, Papers, etc blogs.msdn.com: Why you shouldn't run as admin...Read more
www.eweek.com:
www.eweek.com:
www.insecuremagazine.com: Automated Worm Fingerprinting. Read more Vulnerabilities & Exploits secunia.com: Multiple Browsers Dialog Origin Vulnerability Test. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News news.com.com: An army of soulless 1s and 0s. Read more
www.cio-today.com:
www.reuters.com:
seattletimes.nwsource.com:
news.zdnet.com:
software.silicon.com:
news.com.com:
www.vnunet.com:
www.vnunet.com:
www.techworld.com:
news.com.com:
www.siliconvalley.com:
www.servihoo.com:
hosted.ap.org:
hosted.ap.org:
|
.
24 June 2005 Guides, Papers, etc www.eweek.com: Wireless Access: The Next Great Municipal Crisis. Read more
www.cs.rpi.edu:
www.ifpi.org:
systm.org: Vulnerabilities & Exploits www.eeye.com: RealPlayer vidplin.dll AVI Processing Heap Overflow. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.psphacker.com: News www.theregister.co.uk: Microsoft rolls out SP1 blocker for shy Windows 2003 servers. Read more
news.zdnet.com:
www.pcworld.idg.com.au:
news.bbc.co.uk:
www.zdnet.com.au:
www.terra.net.lb:
www.theregister.co.uk:
news.zdnet.co.uk:
www.vnunet.com:
www.vnunet.com:
|
.
23 June 2005 Guides, Papers, etc www.microsoft.com: The Security Monitoring and Attack Detection Planning Guide. Read more
www.microsoft.com: Vulnerabilities & Exploits securitytracker.com: HP Version Control Repository Manager May Disclose Proxy Password to Local Users. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com: News www.securityfocus.com: Targeted Trojan-horse attacks hitting U.S., worldwide. Read more
www.theregister.co.uk:
www.vnunet.com:
news.com.com:
www.theregister.co.uk:
www.terra.net.lb:
www.terra.net.lb:
www.terra.net.lb:
www.theregister.co.uk:
www.computerworld.com.au:
crn.com:
news.zdnet.co.uk:
www.theregister.co.uk:
news.zdnet.co.uk:
|
.
22 June 2005 Guides, Papers, etc www.secinf.net: Instant Messenger Security: Securing Against the Threat of Instant Messengers. Read more
books.slashdot.org: Vulnerabilities & Exploits wordpress path disclosure by rgod. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News news.zdnet.co.uk: Hacking scandal blamed on broken rules. Read more
www.computerweekly.com:
www.theregister.co.uk:
www.detnews.com:
www.smh.com.au:
australianit.news.com.au:
www.vnunet.com:
www.theregister.co.uk:
www.theinquirer.net:
www.vnunet.com:
www.star-techcentral.com:
techdirt.com:
www.theregister.co.uk:
news.zdnet.co.uk:
|
.
21 June 2005 Guides, Papers, etc program.whatthehack.org: What The Hack is an outdoor hacker conference/event taking place on a large event-campground in the south of The Netherlands from 28 until 31 July 2005. Read more
www.pcworld.com:
www.uniras.gov.uk:
www.astalavista.com: Tools: www.nta-monitor.com: Fingerprinting Tool Identifiies VPN Servers. Read more Vulnerabilities & Exploits www.exploitx.com: Google Exploit Queries Thread. Read more
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
securitytracker.com
www.securiteam.com: News www.theregister.co.uk: MasterCard hack spawns phishing attack. Read more
www.zdnet.com.au:
www.techworld.com:
www.informationweek.com:
www.vnunet.com:
www.thepost.ie:
www.vnunet.com:
|
.
20 June 2005 Guides, Papers, etc www.eweek.com: Botnet Hunters Search for 'Command and Control' Servers. Read more
www.exploitx.com: Vulnerabilities & Exploits www.securiteam.com: Claroline E-Learning Application Remote SQL Injection. Read more
www.exploitx.com: News www.theregister.co.uk: MasterCard fingers partner in 40m card security breach. Read more
www.computerworld.com.au:
www.informationweek.com:
ww.computerworld.com.au:
www.hardwarezone.com:
www.vnunet.com:
|
.
19 June 2005 Vulnerabilities & Exploits securitytracker.com: Sun ONE Messaging Server Lets Remote Users Execute Arbitrary Code on a Target Webmail User's System. Read more
securitytracker.com:
securitytracker.com: News www.newsfactor.com: Fresh Warning over Rise in Mobile Viruses. Read more
www.technewsworld.com:
www.wftv.com:
news.bbc.co.uk:
|
.
18 June 2005 Guides, Papers, etc www.sharp-ideas.net: Pod slurping. Security Risks of iPods. Read more
www.spectrum.ieee.org:
www.infosecwriters.com: An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied by Bill Cheswick. Read more Vulnerabilities & Exploits securitytracker.com: Midnight Commander Buffer Overflow in insert_text() May Let Local Users Gain Elevated Privileges. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.securityfocus.com: MasterCard warns of massive credit-card breach. Read more
www.chron.com:
www.washingtonpost.com:
www.theregister.co.uk:
cyber.law.harvard.edu:
news.zdnet.com:
www.theregister.co.uk:
news.zdnet.com:
www.computerworld.com:
www.emarketer.com:
|
17 June 2005 Guides, Papers, etc www.eweek.com: Are Biometrics the Answer to the Password Problem? Read more Computer Viruses: The Threat Today and The Expected Future by Xin Li, 2003-09-29. Read more Vulnerabilities & Exploits securitytracker.com: Sun Solaris lpadmin Lets Local Users Overwrite Arbitrary Files. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News news.zdnet.com: Your ISP as Net watchdog. Read more
news.com.com:
www.securityfocus.com:
www.msnbc.msn.com/:
www.theregister.co.uk:
news.com.com:
www.detnews.com:
www.globetechnology.com:
www.theregister.com:
news.zdnet.com:
www.antisource.com:
www.haaretz.com:
www.vnunet.com:
news.mywebpal.com:
|
16 June 2005 Guides, Papers, etc www.astalavista.com: Design, Implementation and Test of an Email Virus Throttle. Read more
www.bleedingsnort.com:
www.irongeek.com:
www.irongeek.com: Tools: www.networksecuritytoolkit.org: Network Security Toolkit (NST). Read more Vulnerabilities & Exploits www.eeye.com: eEye Digital Security Announces Discovery of New Security Flaw in Microsoft Windows. Read more
securitytracker.com:
www.securiteam.com:
www.idefense.com: News news.bbc.co.uk: Asian hackers 'target UK firms'. Read more
software.silicon.com:
news.com.com:
news.com.com:
www.vnunet.com:
www.scmagazine.com:
www.adbumb.com:
www.infoworld.com:
www.techworld.com:
www.vnunet.com:
www.theregister.co.uk:
www.620ktar.com:
www.windowsecurity.com:
news.bbc.co.uk:
www.reuters.com:
news.com.com: |
Guides, Papers, etc www.astalavista.com: Warez Trading and Criminal Copyright Infringement. Read more Vulnerabilities & Exploits xforce.iss.net: Multiple Microsoft Vulnerabilities - June 2005. Read more
www.securityfocus.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News Microsoft Security Bulletin MS05-026 Vulnerability in HTML Help Could Allow Remote Code Execution (896358). Read more
Microsoft Security Bulletin MS02-035
Microsoft Security Bulletin MS05-004
Microsoft Security Bulletin MS05-019
www.newscientist.com:
www.cio-today.com:
news.zdnet.com:
www.eweek.com:
www.newsfactor.com:
news.zdnet.com:
www.theregister.co.uk:
www.techweb.com:
www.techweb.com:
www.techweb.com:
news.zdnet.com:
|
Guides, Papers, etc www.securityfocus.com: Software Firewalls: Made of Straw? Read more
www.schneier.com: Towards a Third Generation Data Capture Architecture for Honeynets by Edward Balas and Camilo Viecco. Read more Tools: www.securiteam.com: Anonycat - Anonymous Surfing. Read more Vulnerabilities & Exploits securitytracker.com: Sysreport May Disclose the up2date Proxy Password Via the System Report. Read more
securitytracker.com:
securitytracker.com:
www.cirt.dk:
www.cirt.dk: News www.securityfocus.com: Stealthy Trojan horses, modular bot software dodging defenses. Read more
software.silicon.com:
www.computerworld.com.au:
www.vnunet.com:
www.infoworld.com:
news.com.com:
www.vnunet.com:
|
13 June 2005 Guides, Papers, etc www.isaserver.org: Understanding the Web Proxy and Firewall Client Automatic Configuration. Read more
www.windowsecurity.com:
www.computerworld.com:
www.computerworld.com:
www.computerworld.com:
www.opennetinitiative.net:
www.opennetinitiative.net:
www.opennetinitiative.net: Forensic examination of log files by Joan Petur Petersen. Read more Tools: www.neowin.net: Kaspersky Anti-Virus 2006 (Beta) 6.0.12.167. Read more Vulnerabilities & Exploits securitytracker.com: JamMail Input Validation Hole in 'mail' Parameter Lets Remote Users Execute Arbitrary Commands. Read more
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com: News www.newscientist.com: Computer viruses become hacker informants. Read more
www.zdnet.com.au:
www.asahi.com:
news.bbc.co.uk:
www.zdnet.com.au:
www.chron.com:
australianit.news.com.au:
www.smh.com.au:
www.bizjournals.com:
informationweek.com:
|
12 June 2005 Guides, Papers, etc cc.uoregon.edu: Web Browser Hijacking: What Is It and How Can You Protect Yourself? Read more Checking Microsoft Windows� Systems for Signs of Compromise. Read more News news.moneycentral.msn.com: Microsoft bans 'democracy' for China web users. Read more
news.bbc.co.uk:
news.bbc.co.uk:
www.msnbc.msn.com:
www.informationweek.com:
catless.ncl.ac.uk:
www.sfgate.com:
news.bbc.co.uk:
arstechnica.com:
www.informationweek.com:
news.bbc.co.uk:
www.informationweek.com:
news.bbc.co.uk:
www.informationweek.com:
www.informationweek.com:
www.informationweek.com:
|
11 June 2005 Guides, Papers, etc www.eweek.com: Microsoft's Security Response Center: How Little Patches Are Made. Read more
www.eweek.com:
Black Hat USA 2005 Briefings and Training
www.astalavista.com:
www.eweek.com: Concepts for the Stealth Windows Rootkit (The Chameleon Project) Joanna Rutkowska. Read more Tools: enterprisesecurity.symantec.com: The Symantec Worm Simulator visually demonstrates how worms spread through the Internet, and how they fare against a custom network and security policy. Read more
modGREPER is a hidden module detector for Windows 2000/XP/2003. Vulnerabilities & Exploits securitytracker.com: xMySQLadmin Lets Local Users Delete Files. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.vnunet.com: Jacko suicide Trojan spreading fast. Read more
news.com.com:
www.theregister.co.uk:
news.zdnet.com:
www.techweb.com:
news.zdnet.com:
www.vnunet.com:
news.com.com:
www.theregister.co.uk:
comment.zdnet.co.uk:
www.cio-today.com:
news.zdnet.com:
asia.internet.com:
news.zdnet.com:
www.eweek.com:
www.vnunet.com:
www.cio-today.com:
software.silicon.com:
|
10 June 2005 Guides, Papers, etc www.securityfocus.com: Meanwhile, on the other side of the web server" - a new write-up by Amit Klein. Read more
csrc.nist.gov:
www.eweek.com:
www.biosmagazine.co.uk:
www.techweb.com: Building a GenII Honeynet Gateway by Diego Gonz�lez G�mez. Read more
www.astalavista.com: Vulnerabilities & Exploits securitytracker.com: WinZip Unspecified Buffer Overflows May Let Remote or Local Users Execute Arbitrary Code. Read more
www.securiteam.com:
rgod.altervista.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.zataz.net: News www.vnunet.com: Mytob variant hides sting in the tail. Read more
www.vnunet.com:
www.theregister.co.uk:
www.vnunet.com:
www.techweb.com:
www.vnunet.com:
news.xinhuanet.com:
www.theregister.co.uk:
www.infonetics.com:
www.vnunet.com:
news.com.com:
|
09 June 2005 Guides, Papers, etc www.computerworld.com: Insecurity through obscurity. Read more
www.securityfocus.com:
www.securityfocus.com:
www.computerworld.com:
blog.ziffdavis.com: Application of a Methodology to Characterize Rootkits Retrieved from Honeynets. Read more Vulnerabilities & Exploits research.seniorennet.be: NEW security hole / exploit in IE6 with SP2 and all the latest security patches. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.theregister.co.uk: Bluetooth hack shakes mobile security. Read more
www.theregister.co.uk:
www.theregister.co.uk:
www.theregister.co.uk:
www.theinquirer.net:
www.it-director.com:
www.vnunet.com:
www.informationweek.com:
www.vnunet.com:
www.informationweek.com:
www.informationweek.com:
www.informationweek.com:
www.informationweek.com:
www.infoworld.com:
|
08 June 2005 Guides, Papers, etc www.eeye.com: Vice Newsletter - June 8, 2005. Read more Tools: www.sans.org: Tools for Defense In-Depth. Read more Vulnerabilities & Exploits www.frsirt.com: Kaspersky AntiVirus "klif.sys" Privilege Escalation Vulnerability. Read more
www.rgod.altervista.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.frsirt.com:
www.frsirt.com:
www.appsecinc.com: News constitutionalcode.blogspot.com: Security Researcher Guillermito Fined in Civil Case. Read more
australianit.news.com.au:
www.newscientist.com:
www.benedelman.org:
blog.ziffdavis.com:
www.zdnet.com.au:
www.webuser.co.uk:
news.zdnet.com:
www.theregister.co.uk:
www.zdnet.com.au:
www.theregister.co.uk:
www.theregister.co.uk:
www.it-director.com:
www.zdnet.com.au:
www.businessweek.com:
|
07 June 2005 Guides, Papers, etc www.syn-ack.org: Analysis: Postbank.nl Phishing Scam. Read more
www.theregister.co.uk:
www.theregister.co.uk:
www.wired.com:
www.securityfocus.com:
www.securityfocus.com:
HTTP REQUEST SMUGGLING Tools: www.securityfocus.com: tattle` -- automatic reporting of SSH brute-force attacks. Read more Spam Trap is a CGI gizmo that generates potentially infinite numbers of bogus email addresses to clog up spammers' databases when their email-collecting bots come visiting. Read more Vulnerabilities & Exploits secunia.com: Camino vulnerability re-discovered again Multiple Browsers Frame Injection Vulnerability Test. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.sven-tantau.de:
www.zataz.net:
security.lss.hr:
security.lss.hr: News software.silicon.com: Firefox flaw reopens old wounds. Read more
www.eweek.com:
news.softpedia.com:
www.theregister.co.uk:
www.computerweekly.com:
www.eweek.com:
www.eweek.com:
www.theregister.co.uk:
www.theregister.co.uk:
|
06 June 2005 Guides, Papers, etc The Evolution of Viruses and Worms. Read more Vulnerabilities & Exploits rgod.altervista.org: 602 Lan Suite 2004 _ mailicious tags in GET request lead to malfunction of the HTML server message list in the built-in web server control panel. Read more
securitytracker.com:
News nwc.securitypipeline.com: Tools Help Keep Bugs Out From The Beginning. Read more
www.earthtimes.org:
www.detnews.com:
hosted.ap.org:
www.javareport.com:
nwc.securitypipeline.com:
nwc.securitypipeline.com:
|
05 June 2005 145 new files have been added to the archive. Read more Guides, Papers, etc informationweek.com: Langa Letter: XP Professional's "Remote Control" Option. Read more
www.eeproductcenter.com: INTERNET WORMS AS INTERNET-WIDE THREAT by Nikolai Joukov and Tzi-cker Chiueh. Read more Tools: www.0x90.org: Mezcal is an HTTP/HTTPS bruteforcing tool allowing the crafting of requests and insertion of dynamic variables on-the-fly. Read more
www.ri0tnet.net: Vulnerabilities & Exploits www.net-force.nl: Hacking hotmail, by Alex de Vries - 04 june 2005. Read more
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com:
www.frsirt.com: News www.webuser.co.uk: Mytob worms stop anti-virus protection. Read more
www.pcworld.com:
www.rsicopyright.com:
www.pcworld.com:
|
04 June 2005 145 new files have been added to the archive. Read more Guides, Papers, etc www.astalavista.com: Hacking in a Foreign Language: A Network Security Guide to Russia. Read more
www.annenbergpublicpolicycenter.org: on the Advantages of Deploying a Large Scale Distributed Honeypot Platform. Read more Tools: www.rgod.altervista.org: NmapGUI v0.9 for Win32 by rgod. Read more Vulnerabilities & Exploits www.rgod.altervista.org: Mirc 6.16 & "generic Edit component" win32 trick by rgod. Here it is how a Trojan can take advantage of mirc and other messaging software in order to send to the attacker passwords and other stuff, bypassing firewall rules. Read more
www.debian.org: News times.hankooki.com: N. Korea�s Hacking Capability Could Disrupt US Military: Expert. Read more
www.theregister.co.uk:
www.theregister.co.uk:
www.startribune.com:
www.pcworld.com:
www.theregister.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.vnunet.com:
www.vnunet.com:
|
03 June 2005 145 new files have been added to the archive. Read more Guides, Papers, etc www.securityfocus.com: The True Computer Parasite. Read more
www.vnunet.com:
code.google.com: TROJANS, WORMS, AND SPYWARE, A Computer Security Professional�s Guide to Malicious Code by Michael Erbschloe. Read more
Vulnerabilities & Exploits securitytracker.com: SPA-PRO Mail @Solomon Input Validation Hole Discloses Files to Remote Users and Buffer Overflow Lets Remote Users Execute Arbitrary Code. Read more
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org: News www.cnn.com: Microsoft: MSN site hacked in South Korea. Read more
www.theregister.co.uk:
www.theinquirer.net:
www.vnunet.com:
www.informationweek.com:
comment.zdnet.co.uk:
software.silicon.com:
www.heraldsun.news.com.au: |
02 June 2005 145 new files have been added to the archive. Read more Guides, Papers, etc Beagle.BG-BJ/Mitglieder (Tooso) Propagation by infectionvectors.com. Read more Tools: www.mozilla.org: Deer Park Alpha 1 is an alpha release of our next generation Firefox browser and it is being made available for testing purposes only. Read more
www.earthtimes.org: Vulnerabilities & Exploits securitytracker.com: Symantec Brightmail AntiSpam Uses Common Default Database Password. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News www.internetweek.com: Sober Worm Causes Surge In Virus-Infected E-Mail. Read more
www.theregister.co.uk:
news.zdnet.co.uk:
www.zdnet.com.au:
news.zdnet.co.uk:
www.asahi.com:
news.zdnet.co.uk:
www.pcworld.com:
www.stuff.co.nz:
news.zdnet.com: |
01 June 2005 145 new files have been added to the archive. Read more Guides, Papers, etc www.oxid.it: Remote Desktop Protocol, the Good the Bad and the Ugly. Read more
www.microscope.co.uk:
www.prolexic.com: Hiding an Intrusion Detection System (IDS) by Bob Radvanovsky. Read more Vulnerabilities & Exploits www.securityfocus.com: Microsoft Internet Explorer Valid File Drag and Drop Embedded Code Vulnerability. Read more
www.securityfocus.com:
www.securityfocus.com:
www.securityfocus.com:
www.securityfocus.com:
www.guninski.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News www.eweek.com: Assume Malware Espionage Is Common. Read more
www.computerworld.com:
www.theregister.co.uk:
www.computerworld.com:
software.silicon.com:
www.vnunet.com:
www.telecomasia.net:
www.securityfocus.com/:
www.microscope.co.uk:
www.microscope.co.uk:
www.eweek.com:
www.zone-h.org:
www.internetweek.com:
|
Copyright� MegaSecurity.org