Fake WordPress steals data

Thursday, November 6th, 2008

Yesterday evening amid the researching the Barack related malware our friends at The Register pointed out an interesting article on Craig Murphy’s blog. Craig talks about how when he logged in to his admin account in WordPress he received a “High Risk Vulnerability Warning” from a spoofed WordPress domain. (The last ...

Private Browsing in Firefox

Wednesday, November 5th, 2008

Today, a major feature was added to the pre-release versions of Firefox 3.1, called Private Browsing. I've been working for quite some time on this, so I thought it may be a good time to write about what this feature is and how to use it. As you may know, while ...

Gooscan – Automated Google Hacking Tool

Monday, November 3rd, 2008

Gooscan is a tool that automates queries against Google search appliances, but with a twist. These particular queries are designed to find potential vulnerabilities on web pages. Think “cgi scanner” that never communicates directly with the target web server, since all queries are answered by a Google appliance, not by ...

TrueCrypt 6.1 encryption software released

Monday, November 3rd, 2008

TrueCrypt 6.1, the open source, cross platform disk encryption tool, now supports the encryption of non-system partitions under Windows Vista and Server 2008, without losing the existing data on that partition. However users need to choose "Create Volume/Encrypt a non-system partition/Standard volume/Select Device/Encrypt partition in place" to make use of ...

Keyboards can be snooped remotely

Tuesday, October 21st, 2008

Computer keystrokes can be snooped from afar by detecting the slight electromagnetic radiation emitted when a key is pressed, according to new research. Other security experts have theorised keyboards were vulnerable to such detection, wrote Sylvain Pasini and Martin Vuagnoux, both doctorate students with the Security and Cryptography Laboratory at the ...