Attacks on SHA-1 made even easier

Thursday, June 11th, 2009

Australian researchers have described a new and faster way of provoking collisions of the SHA-1 hash algorithm. With their method, a collision can be found using only 252 attempts. This makes practical attacks feasible and could have an impact on the medium-term use of the algorithm in digital signatures. SHA-1 is ...

Phrack Issue #66 – What You Were Waiting For

Thursday, June 11th, 2009

We have the great pleasure to release today another excellent selection of the best Hacking articles this year. An issue full of new exploitation techniques and ground work on writing attack software. This issue has some evil number.. with a lot of evil content. Phrack proves once more how we can, ...

New Releases of iTunes and QuickTime Fix 11 Vulnerabilities

Monday, June 1st, 2009

Apple has released versions 8.2 of iTunes and 7.6.2 of QuickTime to address a series of vulnerabilities, mostly in QuickTime. The one iTunes vulnerability is a stack overflow in parsing "itms:" URLs which can lead to a DOS or arbitrary code execution. 10 vulnerabilities in QuickTime are all of a type ...

Mathematical advances strengthen IT security

Tuesday, May 12th, 2009

Rapidly rising cyber crime and the growing prospect of the Internet being used as a medium for terrorist attacks pose a major challenge for IT security. Cryptography is central to this challenge, since it underpins privacy, confidentiality, and identity, which together provide the fabric for e-commerce and secure communications. Cryptography ...

New Attack Sneaks Rootkits Into Linux Kernel

Wednesday, April 15th, 2009

Kernel rootkits are tough enough to detect, but now a researcher has demonstrated an even sneakier method of hacking Linux. The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware ...