Detecting, Analyzing, and Exploiting Intranet Applications using JavaScript

Saturday, March 8th, 2008

Imagine visiting a blog on a social site or checking your email on a portal like Yahoo's Webmail. While you are reading the Web page, JavaScript code is downloaded and executed by your Web browser. It scans your entire home network, detects and determines your Linksys router model number, and ...

Web Sites Force Pop-ups Past Blockers

Saturday, March 8th, 2008

On the whole, the internet is a good thing for humankind. However, the internet does have its dark side. Everyone with a regular internet connection knows that there is an unholy trinity that threatens to make the internet so unpleasant that people would rather not use it at all. The ...

Click here to become infected

Saturday, March 8th, 2008

Users should be wary of pressing the 'click here to remove' link on spam messages because it serves to confirm to spammers that junk mail messages are being read. Such email addresses can be sold at a premium to other spammers. That's reason enough to simply delete spam messages, but a ...

CERT recommends anything but IE

Saturday, March 8th, 2008

US CERT (the US Computer Emergency Readiness Team), is advising people to ditch Internet Explorer and use a different browser after the latest security vulnerability in the software was exposed. A statement on the CERT site said: "There are a number of significant vulnerabilities in technologies relating to the IE domain/zone ...

Prevent Browser Hijacking

Saturday, March 8th, 2008

Mike Healan March 23, 2004 If you've ever been infected with a browser hijacker, you know what an infuriating situation it is. For all intents and purposes, your $3,000 computer is converted into a source of revenue for some fly-by-night web site unable to generate legitimate web traffic. Once ...