Duplicating keys from a photograph

Monday, November 17th, 2008

Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine. Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...

Vulnerability discovered in SSH specification

Monday, November 17th, 2008

According to the UK-based Centre for the Protection of National Infrastructure (CPNI), an error in the secure shell protocol (SSH) specification can in rare cases be exploited to reconstruct part of the plain text. According to their description of the error, the standard OpenSSH configuration allows 32 bits of plain ...

FBI Notification – Another Email Scam

Friday, November 14th, 2008

I received another email today supposedly from an FBI Director claiming that I am the beneficiary for a $10.5 million sum.  Basically, it's the newer version of the old Nigeria scam.  Here are the exact email contents, including the basic headers: -----Original Message----- From: Federal Bureau of Investigation [mailto:[email protected]] Sent: Friday, November 14, ...

Forensic tool detects pornography in the workplace

Sunday, November 9th, 2008

The viewing of porn at work can result in lost time, creativity, productivity, and employer profitability. More importantly, it can help create a hostile work environment and can be considered sexual harassment, in violation of Title VII of the Civil Rights Act of 1964. Naturally, corporations want to avoid the ...

Once Thought Safe, WPA Wi-Fi Encryption Is Cracked

Friday, November 7th, 2008

Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks. The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will ...