Apple Adds Anti-Hacker Features to QuickTime

Sunday, April 13th, 2008

Apple is quietly adding several key anti-hacker security features into its flagship QuickTime media player as part of a deliberate plan to reduce the effectiveness of malicious exploits. The XPMs (exploit prevention mechanisms) have been fitted into the WIndows and Mac OS X versions of QuickTime 7.4.5, a new update that ...

Is Outsourcing a Security Risk?

Saturday, April 12th, 2008

The world has a new culprit to blame for the rising tide of software vulnerabilities -- code outsourcing. The trend to outsource the coding of applications is now a major contributor to making business software more vulnerable, a survey-cum-report has claimed. According to analyst group Quocirca, which surveyed 250 IT directors and ...

Content Injection: Hack the Hacker

Friday, April 11th, 2008

Traditional IDS/IPS systems occur at the network level, usually plugged into a spanning port on a switch. I love this concept and think it should be part of any defense in depth strategy. The two primary weaknesses in these devices are, (1) they cannot process encrypted streams and (2) they ...

Wfuzz v1.4 Released for Download – Bruteforcing & Fuzzing Web Applications

Wednesday, April 9th, 2008

A new version of Wfuzz is available, many improvements and fixes since first release which was in the middle of 2007. Fuzzing is definitely in, an article was posted recently about how everyone should keep on fuzzing! Will post it up soon. Wfuzz is a tool designed for bruteforcing Web Applications, ...

Password theft via vulnerability in Google code

Monday, April 7th, 2008

Billy Rios has discovered a vulnerability in the Google Code service which could be exploited to steal passwords from developers who have registered on the site. The Google Security Team has since fixed the vulnerability. Rios succeeded in gaining cross-domain access by uploading a crafted Java applet to a project on ...