Home News Archive Translate Traducen |
News December 2004 |
31 December 2004 Vulnerabilities & Exploits securitytracker.com: Eventum Input Validation Holes Let Remote Users Conduct Cross-Site Scripting Attacks. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.debian.org:
www.debian.org: News: news.com.com: Cabir worm code wriggles onto Web. Read more
lists.netsys.com:
www.securityfocus.com:
www.theregister.co.uk:
nwc.serverpipeline.com:
www.ctv.ca:
|
30 December 2004 Guides, Papers, etc msdn.microsoft.com: Privacy for Browser Users. Read more
www.astalavista.com:
www.knom.or.kr:
www.cymru.com:
www.microsoft.com: Vulnerabilities & Exploits full-disclosure: Multiple Backdoors found in eEye Products (IRIS and SecureIIS). Read more
isec.pl:
www.securiteam.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News: Multiple Backdoors found in eEye Products (IRIS and SecureIIS) During meticulous testing of both eEye's IRIS and SecureIIS products, we have discovered multiple backdoors in the latest of both mentioned products and some older versions we could acquire. These backdoors are very cleverly hidden (kudos to the authors), I personally don't condone illegally backdooring commercial products, and personally I don't think much of eEye but I must give credit to where credit is due. (Lance Gusto). Read more
www.crn.com:
www.theregister.co.uk:
www.stltoday.com:
news.bbc.co.uk:
news.xinhuanet.com:
www.theregister.co.uk:
news.zdnet.co.uk:
www.theregister.co.uk:
|
29 December 2004 Tools www.velasco.com.br: The first Cellphone worm with source code available in the world. Read more Guides, Papers, etc www.net-security.org: Video interview with George P. Japak, Vice President of ICSA Labs. In this video Mr. Japak talks about the importance of product certification, the full disclosure of vulnerabilities, how ICSA Labs approaches product testing, how they determine the severity of a vulnerability, and much more. Download
www.rootkit.com: Vulnerabilities & Exploits securitytracker.com: PHProjekt 'authform.inc.php' Include File Flaw Lets Remote Users Execute Arbitrary Command. Read more
securitytracker.com:
www.astalavista.com: News: www.nwfusion.com: New, virulent Cabir mobile phone worms spotted. Read more
www.technewsworld.com:
www.benningtonbanner.com:
www.theregister.co.uk:
www.xbitlabs.com:
|
28 December 2004 Tools toolbar.netcraft.com: Netcraft Anti-Phishing Toolbar Available for Download. Read more Vulnerabilities & Exploits www.k-otik.com: Internet Explorer Remote Command Execution Exploit (CMDExe). Read more
www.geocities.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.hat-squad.com: News: news.zdnet.co.uk: Google worm turns to AOL and Yahoo. Read more
www.billingsgazette.com:
www.itp.net:
www.theregister.co.uk:
news.zdnet.co.uk:
www.pcworld.com:
|
27 December 2004 Guides, Papers, etc www-2.cs.cmu.edu: Worm Origin Identification Using Random Walks. Read more Vulnerabilities & Exploits www.milw0rm.com: Netcat v1.1, "-e" Switch, Remote Buffer Overflow Exploit v0.1. Read more
secunia.com:
secunia.com:
secunia.com:
secunia.com:
secunia.com:
securitytracker.com: News: www.chron.com: Complex cell phones face threat from viruses. Read more
www.jacksonvilledailynews.com:
|
26 December 2004 Guides, Papers, etc people.ists.dartmouth.edu: Designing a Framework for ActiveWorm Detection on Global Networks. Read more
people.ists.dartmouth.edu: Vulnerabilities & Exploits www.k-otik.com: Santy.c - PHP Scripts Automated Arbitrary File Inclusion. Read more
www.k-otik.com:
freehost07.websamba.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News: www.zone-h.org: New worms use search engines to find victims. Read more
www.detnews.com:
www.yonhapnews.co.kr:
wordpress.org:
|
25 December 2004 Guides, Papers, etc www.crackingislife.com: Video Tutorial, Packing Backdoors to beat AV Detection. Download
scholar.lib.vt.edu:
www.bellua.com:
www.sans.org: Vulnerabilities & Exploits www.velasco.com.br: VELASCO Worm for Symbian phones. Read more
www.milw0rm.com:
www.mikx.de:
freehost07.websamba.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.debian.org:
www.debian.org: News: freehost07.websamba.com: Although hundreds of millions of dollars have been spent on securing SP2,perfection is impossible. Through the joint effort of Michael Evanchik (http://www.michaelevanchik.com) and Paul from Greyhats Security (http://greyhats.cjb.net), a very critical vulnerability has been developed that can compromise a user's system without the need for user interaction besides visiting the malicious page. The vulnerability is not actually a vulnerability in itself, but rather it is uses multiple known holes in SP2 including Help ActiveX Control Related Topics Zone Security Bypass Vulnerability and Help ActiveX Control Related Topics Cross Site Scripting Vulnerability. Read more
www.cbronline.com:
www.pdabuzz.com:
www.pcworld.com:
www.sophos.com:
www.linuxsecurity.com:
wifi.weblogsinc.com:
www.usatoday.com:
www.startribune.com:
|
24 December 2004 Guides, Papers, etc www.dataloss.net: How we defaced www.apache.org. Read more Vulnerabilities & Exploits www.velasco.com.br: Proof-of-concept, the first Brazilian Cell Phone worm for Symbian systems, spread by Bluetooth: Download
www.xfocus.net:
www.securityfocus.com:
www.k-otik.com:
www.securityfocus.com:
www.wheresthebeef.co.uk:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News: news.zdnet.com: Exploits released for new Windows flaws. Read more
www.pcworld.com:
www.pcworld.com:
news.xinhuanet.com:
software.silicon.com:
informationweek.com:
|
23 December 2004 Guides, Papers, etc www.honeynet.org: Trend: Life expectancy increasing for unpatched or vulnerable Linux deployments. Read more
www.finjan.com:
www.securityfocus.com: Vulnerabilities & Exploits www.securiteam.com: phpBB highlight Arbitrary File Upload (Santy.A). Read more
www.securiteam.com:
www.securiteam.com:
secunia.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.idefense.com:
www.idefense.com:
www.idefense.com:
www.idefense.com:
www.idefense.com:
www.idefense.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org:
www.debian.org: News: www.securityfocus.com: Groups fight Internet wiretap push. Read more
www.startribune.com:
www.vnunet.com:
www.vnunet.com:
www.theregister.co.uk:
www.globetechnology.com:
news.zdnet.com:
my.bend.com:
www.theregister.co.uk:
www.theregister.co.uk:
news.com.com:
|
22 December 2004 Guides, Papers, etc www.cs.tcd.ie: Internet Worm Detection as part of a Distributed Network Inspection System. Read more
www.acmqueue.com: Vulnerabilities & Exploits secunia.com: Spy Sweeper Enterprise Client Privilege Escalation Vulnerability. Read more
secunia.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org:
www.debian.org: News: www.theregister.co.uk: Santy worm defaces thousands of sites. The Santy worm searches for vulnerable forum sites using Google. When a suitable target is found, Santy uses a remote exploit to gain access and deface it before resuming its scanning activity. Read more
news.zdnet.com:
news.xinhuanet.com:
news.zdnet.com:
www.theregister.co.uk:
seclab.cs.rice.edu:
comment.silicon.com:
www.infosync.no:
www.theregister.co.uk:
www.theregister.co.uk:
news.zdnet.com:
www.cnn.com: |
21 December 2004 Tools uk.news.yahoo.com: Knoppix slims down Linux Live CD. Read more
www.cirt.dk: Guides, Papers, etc blogs.msdn.com: How can I trust Firefox? Read more
www1.cs.columbia.edu: Vulnerabilities & Exploits www.securiteam.com: Hotmail Cross Site Scripting Vulnerability (Malformed Tags). Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.debian.org:
www.debian.org:
www.debian.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News: www.theregister.co.uk: Teenage British Trojan distributor escapes jail. Read more
www.theregister.co.uk:
www.news24.com:
www.theregister.co.uk:
www.billingsgazette.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.heise.de:
www.theregister.co.uk:
www.sbsun.com:
www.gripe2ed.com:
|
20 December 2004 Guides, Papers, etc www.usenix.org: Call for Papers, 14th USENIX Security Symposium August 1�5, 2005, Baltimore, MD. Read more
www.microsoft.com: Vulnerabilities & Exploits www.securityfocus.com: Microsoft Windows Media Player 9 Vulns. Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.winnetmag.com: News: news.zdnet.com: Hotmail dumps McAfee's antivirus for Trend Micro. Read more
news.zdnet.com:
www.cnn.com:
news.zdnet.com:
www.crime-research.org:
blogs.zdnet.com: |
19 December 2004 Guides, Papers, etc www.informit.com: Fighting Fire with Fire: Designing a "Good" Computer Virus. Read more
www.sans.org: Internet Humor. Do you use TinyURL? How about HugeURL instead? (thanks to Larry Zeltzer) Vulnerabilities & Exploits securitytracker.com: Symantec Brightmail Can Be Crashed By Remote Users Sending Mail with Nested MIME Attachments. Read more
securitytracker.com: News: itvibe.com: afi virus threat finally begins to subside. Read more
www.620ktar.com:
www.detnews.com:
www.theregister.co.uk:
www.theregister.co.uk:
business.bostonherald.com:
www.thepost.ie: |
18 December 2004 Tools www.computec.ch: The acronym ATK stands for Attack Tool Kit. It was first developed to provide a very small and handy tool for Windows to realize fast checks for dedicated vulnerabilities. Read more Guides, Papers, etc www.eecs.harvard.edu: Fast Detection of Scanning Worm Infectio (pdf). Read more Vulnerabilities & Exploits freehost07.websamba.com: MSIE DHTML Edit Control Cross Site Scripting Vulnerability. Read more
www.zone-h.org:
www.hardened-php.net:
www.securityfocus.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News: news.zdnet.co.uk: Massive IE phishing exploit discovered. Read more
news.zdnet.co.uk:
www.betanews.com:
www.computerweekly.com:
www.securityfocus.com:
www.computerworld.com: |
17 December 2004 Guides, Papers, etc www.cybercrime.gov: Computer Intrusion Cases. Read more
www.cs.berkeley.edu:
www.microsoft.com: Vulnerabilities & Exploits secunia.com: Internet Explorer DHTML Edit ActiveX Control Cross-Site Scripting. Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
tigger.uic.edu:
www.securiteam.com:
www.debian.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News: Internet Explorer DHTML Edit ActiveX Control Cross-Site Scripting Paul has reported a vulnerability in Internet Explorer, which can be exploited by malicious people to conduct sophisticated cross-site scripting attacks against any web site. Please see the test below for an example of how this vulnerability can be exploited. Test Case / Demonstration The test will open a new window, where the address bar writes "https://www.paypal.com/", but the page is actually displaying content from Secunia. Read more
news.zdnet.co.uk:
news.zdnet.co.uk:
www.theregister.co.uk:
www.securityfocus.com:
www.microsoft.com:
www.theregister.co.uk:
www.securityfocus.com:
news.zdnet.co.uk:
www.theregister.co.uk: |
16 December 2004 Vulnerabilities & Exploits www.guninski.com: Fun with the linux kernel (2.6,2.4). windoze is a joke. Read more
cr.yp.to:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News: www.smh.com.au: 'Unnecessary' software updates cost millions. Read more
www.theregister.co.uk:
news.zdnet.co.uk:
www.securityfocus.com:
abcnews.go.com:
www.theinquirer.net:
www.techweb.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.theregister.co.uk: |
15 December 2004 Guides, Papers, etc www.securityfocus.com: WEP: Dead Again, Part 1. Read more
www-unix.ecs:
www.finjan.com: Vulnerabilities & Exploits www.idefense.com: Adobe Acrobat Reader 5.0.9 mailListIsPdf() Buffer Overflow Vulnerability. Read more
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
isec.pl:
www.debian.org:
www.debian.org:
zone-h.org: News: www.microsoft.com: Microsoft Security Bulletin Summary for December, 2004. Read more
Microsoft Security Bulletin MS04-028
Microsoft Security Bulletin MS04-041
www.zdnet.com.au:
www.computerworld.com:
www.thecouriermail.news.com.au:
star-techcentral.com:
|
14 December 2004 Guides, Papers, etc www.virusthreatcenter.com: How worms work: Why are they considered viruses? (pdf) Download
www.virusbtn.com: Vulnerabilities & Exploits www.gentoo.org: nfs-utils: Multiple remote vulnerabilities. Read more
www.securityfocus.com:
www.infiltrated.net:
www.exaprobe.com:
www.zone-h.org:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com:
www.turbolinux.com:
www.man.poznan.pl: News: www.smh.com.au: Police given computer spy powers. Read more
www.securityfocus.com:
itvibe.com:
www.computerweekly.com:
www.websidestory.com:
www.theregister.co.uk:
nwc.storagepipeline.com:
www.stuff.co.nz: |
13 December 2004 Password stealing trojan AR34 Guides, Papers, etc Bellua Cyber Security Asia 2005 From 21st - 24th March the largest information security conference in Asia will take place in Jakarta, Indonesia at the Hotel Borobudur. Read more
news.com.com: Vulnerabilities & Exploits secunia.com: Opera Download Dialog Spoofing Vulnerability. Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
packetstormsecurity.nl: News: On December 14, 2004 the Microsoft Security Response Center is planning to release: � 5 Microsoft Security Bulletins affecting Microsoft Windows � The greatest maximum severity rating for these security updates is Important � Some of these security updates may require a restart Read more
news.netcraft.com:
|
12 December 2004 Guides, Papers, etc SRUTI 2005 Workshop SRUTI: Steps to Reducing Unwanted Traffic on the Internet. The Internet is under increasing attacks with unwanted traffic in the form of spam, distributed denial of service, virus, worms, etc. Unwanted traffic on the Internet has manifested itself as attacks on many protocols (IP, TCP, DNS, BGP, and HTTP) and popular applications (e.g., Email, Web). Recently, attacks combining multiple exploits have become common. Many solutions have been proposed for specific attacks, some of which have had limited success. SRUTI seeks research on the unwanted traffic problem that looks across the protocol stack, examines attack commonalities, and investigates how various solutions interact and whether they can be combined to increase security. Read more
www.scs.carleton.ca: Vulnerabilities & Exploits securitytracker.com: OpenText FirstClass Unspecified Flaw Lets Remote Users Deny Service. Read more
securitytracker.com:
www.securiteam.com: News: searchsecurity.techtarget.com: The security lingo of 2004. "As far as I'm concerned, Bot is a big word as far as malicious activity for 2004," said Josh Lackey, an ethical hacker for IBM. "Bots nowadays have all sorts of functionality -- keystroke grabbers, network sniffers and the spam-forwarding proxies they kick off. As far as trends, spam has been a big thing, one of the biggest moneymakers out there, and the bots are behind a lot of this activity." Read more
www.webroot.com:
www.smh.com.au:
news.zdnet.com:
www.msnbc.msn.com:
www.spacedaily.com:
www.forbes.com: |
11 December 2004 Guides, Papers, etc www.trendmicro.com: The Trend of Malware Today: 2004 � 1st Quarter Recap. Read more
www.trendmicro.com: JPEG Vulnerability: A day in the life of the JPEG Vulnerability. Read more
www.sans.org:
www.msnbc.msn.com: Vulnerabilities & Exploits HOW TO BREAK XP SP2 POPUP BLOCKER: kick it in the nut ! Internet Explorer 6 on the gadget commonly known as Windows XP SP2 enjoys a fairly robust "popup blocker". This little 'thing' has been a major irritation to date. Nothing gets past it until now. Chatter exists that some sites have defeated it on the causal default setting. We only deal in the high settings here ! Our Chairman and CEO, Mr. Liu Die Yu takes the sledgehammer and cracks open this bothersome little nut like so: popup test
security.tombom.co.uk:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org: News: www.eweek.com: 'Playboy' Virus Dropping Dangerous Backdoor. Read more
news.com.com:
www.eweek.com:
story.news.yahoo.com:
www.vnunet.com:
www.vnunet.com:
www.theregister.co.uk:
www.nwfusion.com:
news.com.com:
www.vnunet.com: |
10 December 2004 Tools www.oxid.it: sTerm is a Telnet client with a unique feature. It can establish an entire bi-directional Telnet session to a target host never sending your real IP and MAC addresses in any packet. Using "ARP Poisoning", "MAC Spoofing" and "IP Spoofing" techniques sTerm can effectively bypass ACLs, Firewall rules and IP restrictions on servers and network devices. The connection will be done impersonating a Trusted Host. Read more
www.deepnetexplorer.com: Guides, Papers, etc techrepublic.com.com: Identify/React Chart: Bofra (pdf). Read more
www.shocking.com:
www.w3.org: Vulnerabilities & Exploits www.shocking.com: RSnake's MSIE 6.0 SP1 OS and application tester only works for MSIE 6.0 on Microsoft. Read more
www.shocking.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com: News: www.theregister.co.uk: The strange death of the mass mailing virus. Read more
news.zdnet.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.theregister.co.uk:
news.zdnet.co.uk:
www.eweek.com:
www.reuters.com:
www.net4nowt.com:
www.pcworld.com:
news.zdnet.co.uk:
www.ottawabusinessjournal.com:
news.com.com:
www.net4nowt.com:
www.theregister.co.uk: |
09 December 2004 Tools Absinthe is a GUI-based (GTK-Sharp) tool that automates the process of downloading the schema & contents of a database that is vulnerable to Blind SQL Injection. Read more Guides, Papers, etc blanu.net: Curious Yellow: The First Coordinated Worm Design. Read more
www.astalavista.com: Vulnerabilities & Exploits secunia.com: List of Patched/Unpatched Secunia Advisories. Read more
www.2ka.org:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
securitytracker.com:
www.securiteam.com: News: www.techweb.com: Most Browsers Buggy, Even IE In XP SP2. Read more
secunia.com:
www.securityfocus.com:
www.prnewswire.com:
news.zdnet.com:
www.techweb.com:
news.zdnet.co.uk:
www.sophos.com:
www.eweek.com:
uk.news.yahoo.com:
news.zdnet.com:
nwc.linuxpipeline.com:
www.reuters.com: |
08 December 2004 Tools GreyMagic Online Script Decoder The online script decoder decodes scripts that were encoded with the Microsoft Script Encoder (screnc.exe). Read more
www.doxpara.com:
www.interpactinc.com: Guides, Papers, etc www.doxpara.com: MD5 To Be Considered Harmful Someday (pdf). Read more
www.astalavista.com:
scholar.google.com:
folder-password-expert.com: Vulnerabilities & Exploits www.securityfocus.com: IE6 Vulnerability - Local File Detection. Read more
www.debian.org:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com: News: www.benedelman.org: DirectRevenue Deletes Competitors from Users' Disks. Read more
www.theregister.co.uk:
www.theregister.co.uk:
www.eweek.com:
news.zdnet.co.uk:
www.viruslist.com:
thewhir.com:
www.nwfusion.com: |
07 December 2004 Guides, Papers, etc www.securityfocus.com: Detecting Complex Viruses. Read more
users.ece.gatech.edu:
www.cs.biu.ac.il:
www.messagelabs.com: Vulnerabilities & Exploits maas-online.nl: Mozilla Products Remote Crash Vulnerability. Read more
www.debian.org:
www.exaprobe.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com: News: www.scmagazine.com: Trojan poses as spam-hating screensaver. Read more
www.computerweekly.com:
www.theregister.co.uk:
www.theregister.co.uk:
www.computerweekly.com:
news.netcraft.com:
news.zdnet.co.uk: |
06 December 2004 Tools www.porcupine.org: TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. Read more Guides, Papers, etc www.thebroken.org: Cybersecurity for the Homeland (pdf). Read more
www.arxiv.org:
www.icir.org:
www.icir.org: Vulnerabilities & Exploits www.securitytracker.com: Hosting Controller 'Statsbrowse.asp' and 'Generalbrowse.asp' Disclose Files to Remote Authenticated Users. Read more
www.gentoo.org: News: www.zone-h.org: First Google web site to be defaced. Read more
www.net4nowt.com:
www.stuff.co.nz:
www.bluetoothinsider.com:
www.antiphishing.org: |
05 December 2004 Tools e3d is a 3D visualization tool for network (security) information, it currently supports nmap and languard XML log files. It works on wintendo, linux and os x (the last two might need some changes to get this version to compile). Read more
www.morphix.org:
www.phlak.org: Guides, Papers, etc www.cs.berkeley.edu: The Spread of the Sapphire/Slammer Worm. Read more Vulnerabilities & Exploits www.securityfocus.com: Opera 7.54 vulnerabilities again (still unfixed). Read more
www.milw0rm.com:
www.milw0rm.com:
docs.info.apple.com:
News: www.infoworld.com: Mobile phones: An ear full of worms. Read more
www.washingtontimes.com:
www.computerworld.com:
www.computerworld.com:
www.infosyssec.com:
www.kentucky.com:
news.com.com:
www.bradenton.com:
www.computerworld.com: |
04 December 2004 Tools www.4os.org: Spectrum is a proof of concept backdoor that "hops" to a different random port after every connection. It consists of a client and a server. Download
MenuetOS is an Operating System for the PC written entirely in 32bit assembly language, and released under the GPL.
www.4os.org: Guides, Papers, etc www.hackingspirits.com: Anti-Virus Evasion Techniques and Countermeasures. The objective of this article is to demonstrate different possible ways that viruses and worms coders use to evade any Anti-Virus products while coding malicious programs and at the same time I also explained about the countermeasures techniques to prevent against such attacks. Download
www.astalavista.com:
www.4os.org:
honeynet.org: Vulnerabilities & Exploits www.securitytracker.com: hpsockd Input Validation Flaw Lets Remote Users Crash the Service. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
docs.info.apple.com:
News: blog.ziffdavis.com: Microsoft's Cheesy Workaround To WINS Vulnerability. Read more
www.virusbtn.com:
news.zdnet.com:
www.computerworld.com:
www.computerworld.com:
www.informationweek.com:
www.computerworld.com: |
03 December 2004 Tools invisiblethings.org: Patchfinder2 rootkit detector for Windows 2000. Download
invisiblethings.org: Guides, Papers, etc invisiblethings.org: Concepts for the Stealth Windows Rootkit. (pdf) Read more
invisiblethings.org:
invisiblethings.org: Vulnerabilities & Exploits www.securitytracker.com: Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org: News: www.securityfocus.com: Official IFRAME patch - make sure it installs correctly. Read more
news.zdnet.co.uk:
news.zdnet.co.uk:
news.zdnet.co.uk:
www.vnunet.com:
www.theregister.co.uk:
www.vnunet.com:
news.com.com:
www.computerworld.com:
news.zdnet.co.uk:
www.theregister.co.uk:
www.bradenton.com:
www.tmcnet.com:
news.zdnet.co.uk:
www.securityfocus.com:
www.theregister.co.uk: |
02 December 2004 Guides, Papers, etc www.astalavista.com: An analysis of Bofra (aka MyDoom.AG/AH). Read more Vulnerabilities & Exploits www.remote-exploit.org: Wireless default settings and related vulnerability list. Read more
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securiteam.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.debian.org: News: Microsoft Security Bulletin MS04-040 Cumulative Security Update for Internet Explorer (889293). Read more
news.com.com:
news.zdnet.com:
news.com.com:
www.deepnetexplorer.com:
news.com.com:
www.usatoday.com:
informationweek.com:
news.zdnet.co.uk:
www.theregister.co.uk:
www.it-observer.com:
www.theregister.co.uk:
www.zdnet.com.au:
www.news.com.au:
www.securityfocus.com:
www.zdnet.com.au: |
01 December 2004 Vulnerabilities & Exploits www.securitytracker.com: CuteFTP Professional FTP Reply Error Remote Denial of Service. Read more
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securitytracker.com:
www.securiteam.com: News: itreview.belproject.com: Automated "Bots" Overtake PCs Without Firewalls Within 4 Minutes; Experiment Reveals How Different Platforms Protect Against Internet Attacks. Read more
news.zdnet.co.uk:
www.vnunet.com:
news.zdnet.co.uk:
www.reuters.com:
news.zdnet.co.uk:
www.vnunet.com:
news.xinhuanet.com:
news.zdnet.co.uk:
www.theregister.co.uk:
software.silicon.com:
www.antiphishing.org: |
Copyright� MegaSecurity.org