Clone Your VirtualBox Image

Monday, December 29th, 2008

I found out the hard way that you cannot simply copy and paste your .vdi file, rename, and add a second virtual machine to your system.  Each VDI file has a unique UUID that a single VirtualBox installation will not duplicate.  You have to "clone" it.  The screenshot below is ...

Unprotected computer rendered unusable in under two hours

Monday, December 1st, 2008

In just under two hours an unprotected computer was rendered unusable through online attacks in an experiment in Auckland today. The experiment was designed to show what a household with a computer put itself at risk of everyday, and was carried out by NetSafe and IBM. It was carried out to mark ...

Duplicating keys from a photograph

Monday, November 17th, 2008

Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine. Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...

Android flaw executed typed text

Monday, November 10th, 2008

With the news that Google's Android shipped with an embarrassing security hole being followed by a simple two-step method to 'jailbreak' the OS, you'd think that the company had ironed out most of the remaining bugs – but you'd be wrong. According to ZDnet's Ed Burnette, the open-source Linux-based smartphone platform ...

Once Thought Safe, WPA Wi-Fi Encryption Is Cracked

Friday, November 7th, 2008

Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks. The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will ...