| |
Current Topic: Computer Security |
|
Topic: Computer Security |
2:32 am EST, Feb 22, 2005 |
] The virus could wirelessly infect nearby phones. ] Susceptible devices are certain smartphones, a ] combination of a handheld computer and cell phone. The ] phones must have Bluetooth, wireless data transfer. ] Recipients would have to manually accept the infected ] file when a message appears on the phone's screen. The ] phone would then display text Caribe-VZ/29A, identifying ] the author's intended name for the virus, the author's ] initials and the hacker group. ] There's good news: So far it appears the worm hasn't ] penetrated the Big Apple. Coming soon: "Someone in the area has a virus!" shouts coming from around you. AND.. "Do you use protection?" jokes when transferring photos between phones. Newsday.com - Technology |
|
New York Post: New Yorkers find new way to be forcibly inconsiderate |
|
|
Topic: Computer Security |
3:13 am EST, Feb 21, 2005 |
] Illegal gizmos that interfere with signals and cut off ] reception are selling like hotcakes on the streets of ] New York. ] ] "I bought one online, and I love it," said one jammer ] owner fed up with the din of dumb conversations and ] rock-and-roll ringtones. ] ] "I use it on the bus all the time. I always zap the ] idiots who discuss what they want from the Chinese ] restaurant so that everyone can hear them. Why is that ] necessary?" Eye spy with my little eye a store on 3rd that's going to be the site of a very public bust by a federal agency tasked with allocating and protecting the radio spectrum. New York Post: New Yorkers find new way to be forcibly inconsiderate |
|
Morris's Internet Worm Source Code |
|
|
Topic: Computer Security |
2:50 am EST, Feb 8, 2005 |
The complete commented source code of Robert Morris's worm, which brought the Internet to its knees in 1988 Morris's Internet Worm Source Code |
|
Topic: Computer Security |
3:54 pm EST, Feb 7, 2005 |
Essentially the issue is that you can register domain names using international character sets that look exactly like English, and obtain SSL certificates for them, and it is extremely difficult for the end user to be able to tell that he/she isnt dealing with the English website. Working example of https://www.paypal.com/ demonstrated. Shmoo DNS attack |
|
SecurityFocus - Hacker penetrates T-Mobile systems |
|
|
Topic: Computer Security |
4:19 pm EST, Jan 12, 2005 |
A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned. This might be the reason that my GPRS Bluetooth Internet does not work anymore. Their network appears to be riddled with holes and bad design. Apparently the only reason I had Internet dial-up access was because they expect the phones to be the point that authorizes access to the network, as opposed to some method that isn't inherently flawed. I can still find ways to get traffic through their current firewalls, although any way a full net connection could be established would require methods that would make it way more inefficient then it was when it worked normally. Right now, imaps and DNS look ups work for instance. That's both a UDP and TCP way to funnel a tunnel right there... Or you could just pay $19 a month for less then 19.2k worth of dropped TCP connections and spotty connectivity you'll use about once every three months. Lets hear it for major telecommunication providers with ass backwards security. Phbttt.. SecurityFocus - Hacker penetrates T-Mobile systems |
|
Hydan: Information Hiding in Program Binaries |
|
|
Topic: Computer Security |
6:44 pm EDT, Aug 12, 2004 |
] Hydan steganographically conceals a message into an ] application. It exploits redundancy in the i386 instruction ] set by defining sets of functionally equivalent instructions. ] It then encodes information in machine code by ] using the appropriate instructions from each set. Hydan: Information Hiding in Program Binaries |
|
Wired News: A Gathering to Hack the System |
|
|
Topic: Computer Security |
5:37 pm EDT, Jul 12, 2004 |
] An ominous drawing of a face sporting Hitler's moustache ] and a vampire's coif was emblazoned on the bright red ] banners that hung behind the speakers' podiums. Printed ] underneath the grim visage was a warning: "Big Brother Is ] Watching You." Wired on this year's Hope. Wired News: A Gathering to Hack the System |
|
Hackers spread hostage video |
|
|
Topic: Computer Security |
4:07 pm EDT, Jun 18, 2004 |
] The origin of the video was traced to Silicon Valley Land ] Surveying Incorporated, a California land surveying and ] mapping company, said Spiegel online, the internet ] service for the respected German weekly. ] ] The magazine said that according to its research the move ] was the first time al-Qaeda had "hijacked" a website to ] broadcast its propaganda. ] ] The network usually spreads its message through Islamist ] sites but this time, Spiegel maintains, hackers created a ] special file at the company's web address at least an ] hour before global news agencies broke word of the video. First report of Al'Q hackers Hackers spread hostage video |
|
Symantec Security Response - EPOC.Cabir |
|
|
Topic: Computer Security |
7:33 pm EDT, Jun 15, 2004 |
] EPOC.Cabir is a proof-of-concept worm that replicates on ] Nokia Series 60 phones. This worm repeatedly sends itself ] to the first Bluetooth-enabled device that it can find, ] regardless of the type of device. For example, even a ] Bluetooth-enabled printer will be attacked if it is ] within range. ] ] The worm spreads as a .SIS file, which is automatically ] installed into the APPS directory when the receiver ] accepts the transmission. This one effects my phone. According to this, you have to accept the connection to be infected. Symantec Security Response - EPOC.Cabir |
|
Topic: Computer Security |
6:17 pm EDT, Jun 15, 2004 |
From isc.incidents.org: ] Starting at around 8:30 am EDT (12:30 UTC), a number of ] sources started to report a widespread Akamai DNS issue. ] Large web sites, which use Akamai for its DNS service, no ] longer resolved in DNS, and became inaccessible to their ] users. The affected sites were Yahoo, Google, Microsoft, ] FedEx, Xerox, Apple and likely many others. The situation ] improved around 10:30 EDT, mainly because some of the ] affected domains temporarily switched from using Akamai ] DNS servers to their own DNS servers. ] ] The problems seem to be attributable to a DDoS attack on ] Akamai's DNS servers, though we do not presently have the ] information to make a definitive assessment. According to ] the Akamai spokesperson, the problem was not limited to ] Akamai. He attributed the outage to an attack on the ] Internet infrastructure on a larger scale. We do not ] currently know of any sites that were affected by the ] attack without using Akamai's services. At least it wasn't the Roots/GTLDs.. According to Netcraft, it also effected antivirus update services for Symantec and TrendMicro. Google Search: akamai |
|