Detecting, Analyzing, and Exploiting Intranet Applications using JavaScript

Saturday, March 8th, 2008

Imagine visiting a blog on a social site or checking your email on a portal like Yahoo's Webmail. While you are reading the Web page, JavaScript code is downloaded and executed by your Web browser. It scans your entire home network, detects and determines your Linksys router model number, and ...

Cisco: The Next Big Security Concern

Saturday, March 8th, 2008

Which operating system, embedded in more than 80% of enterprise IT environments, represents one of the fastest-growing hacker targets and potentially the most-devastating information-security vulnerability? Hint: It ain't Windows. Cisco Systems' Internetwork Operating System now sits at the center of the information security vortex. Because IOS controls the routers that ...

Security Bug in Linksys Wireless-G Router

Saturday, March 8th, 2008

Cisco's Linksys WRT54G Wireless-G Broadband Router has a flaw that could allow an attacker to gain administrative privileges on vulnerable devices. Even if the remote administration feature on the device is turned off, the router serves the administration web page on ports 80 and 443, protected only by a weak ...

The New NAT-Friendly Microsoft

Saturday, March 8th, 2008

VPN just got easier. Windows 2000 and XP clients can do IPSec out of the box, but when you attempt to VPN to an external resource from behind a NAT router/firewall, challenges ensue. To date, Microsoft has not gotten along well with NAT, but in a brand new update made ...