Debian and Ubuntu keys under attack

Friday, May 16th, 2008

A recently disclosed vulnerability in widely used Linux distributions can be exploited by attackers to guess cryptographic keys, possibly leading to the forgery of digital signatures and theft of confidential information, a noted security researcher said Thursday. HD Moore, best known as the exploit researcher who created the Metasploit penetration testing ...

Bots Use SQL Injection Tool in New Web Attack

Wednesday, May 14th, 2008

A little-known botnet has put a different spin on the recent wave of SQL injection attacks on thousands of Websites: It’s outfitting its bots with its own tool to launch SQL injection attacks on vulnerable sites. The Asprox botnet, a relatively small botnet known mainly for sending phishing emails, has been ...

New Tests Show Rootkits Still Evade AV

Tuesday, May 13th, 2008

Rootkits are still a security scanner’s worst nightmare: New rootkit detection tests recently conducted by AV-Test.org found that security suites and online Web scanners detected overall only a little more than half of rootkits. AV-Test.org, an indie security test organization based in Germany, ran two rootkit tests last month, one on ...

Reading EXIF data with Javascript

Sunday, May 11th, 2008

Inspired by a comment on Ajaxian, I killed another afternoon or two making a small library capable of reading EXIF data from JPEG images, figuring I would at least learn a bit about EXIF and the JPEG (and TIFF) image formats. Before we start, a small disclaimer. I'm somewhat of a ...

SQL Injection Worm on the Loose

Wednesday, May 7th, 2008

A loyal ISC reader, Rob, wrote in to point us at what looks to be a SQL Injection worm that is on the loose.  From a quick google search it shows that there are about 4,000 websites infected and that this worm started at least mid-April if not earlier.  Right ...