Facebook botnet risk revealed

Saturday, September 6th, 2008

Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into a botnet that launched denial-of-service attacks on a victim server in a demonstration. "Social Network Web sites have the ideal properties to become attack platforms," according to a ...

Google Chrome vulnerable to carpet-bombing flaw

Tuesday, September 2nd, 2008

Google’s shiny new Web browser is vulnerable to a carpet-bombing vulnerability that could expose Windows users to malicious hacker attacks. Just hours after the release of Google Chrome, researcher Aviv Raff discovered that he could combine two vulnerabilities — a flaw in Apple Safari (WebKit) and a Java bug discussed at ...

Demonstration Reveals Net Superattack to be Very, Very Real

Thursday, August 28th, 2008

A pair of security researchers recently demonstrated that a theoretical attack possible against the internet’s most embedded infrastructure can, in fact, be very real. The attack exploits normal behavior in the internet routing protocol BGP, which ISPs use to determine how best to route traffic destined for other parts of the ...

How to Use Honeypots to Improve Your Network Security

Monday, August 25th, 2008

Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used in order to protect communication networks include firewalls, encryption and IDS (Intrusion Detection Systems). The strategy follows the classical security paradigm of "Protect, Detect and React.” In other words, try to protect the ...

Windows Jingle Attack Exposed

Sunday, August 10th, 2008

At the Black Hat conference in Las Vegas on Thursday, Eric Filiol, the head scientist at the French Army Signals Academy's Virology and Cryptology Lab, explained how to steal data from a computer without a network connection.Filiol demonstrated what he called the Windows Jingle Attack, a method for encoding a ...