Phrack Issue #66 – What You Were Waiting For

Thursday, June 11th, 2009

We have the great pleasure to release today another excellent selection of the best Hacking articles this year. An issue full of new exploitation techniques and ground work on writing attack software. This issue has some evil number.. with a lot of evil content. Phrack proves once more how we can, ...

Six Steps to Stop SQL Injections

Monday, June 8th, 2009

According to IBM ISS X-Force findings, SQL injections last year became the most common Web-based attack technique. Hackers are successful with these attacks largely due to poor coding practices. The following are six ways organizations can start to mitigate the risk from SQL injections. Slideshow: http://www.baselinemag.com/c/a/IT-Management/Six-Steps-to-Stop-SQL-Injections-129263/

Mass Injection Attack Affects 40,000 Websites

Tuesday, June 2nd, 2009

Researchers at Websense have discovered a mass injection attack that is redirecting Web browsers to a malware-bearing site. According to a weekend report by researchers at Websense, thousands of legitimate Web sites have been discovered to be injected with malicious Javascript, obfuscated code that leads to an active exploit site. "The active ...

Stealthy Rootkit Slides Further Under the Radar

Wednesday, April 15th, 2009

Thousands of Web sites have been rigged to deliver a powerful piece of malicious software that many security products may be unprepared to handle. The malicious software is a new variant of Mebroot, a program known as a "rootkit" for the stealthy way it hides deep in the Windows operating system, ...

New Attack Sneaks Rootkits Into Linux Kernel

Wednesday, April 15th, 2009

Kernel rootkits are tough enough to detect, but now a researcher has demonstrated an even sneakier method of hacking Linux. The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware ...