Recovering from the Encryption Virus

Tuesday, June 17th, 2008

Kaspersky Lab has published advice on recovering files encrypted by the frightening Gpcode.ak virus, but there is a big catch -- users must not have turned off their PC first. A new variant of the malware struck last week, scrambling a variety of files on victims' PCs using a very strong ...

BackTrack: A penetration testers toolset

Tuesday, June 17th, 2008

There are few job titles as misleading as that of the "Penetration Tester." Sure, saying professional computer hacker would be more direct, but have you ever noticed how hackers seem to have a dirty mind? Why else would they want to go phreaking through backdoors? Anyway, in order for hackers to ...

Compression lets attackers tap VoIP calls

Tuesday, June 17th, 2008

A common compression technique can make internet telephone calls significantly more susceptible to bugging, according to recent research from Johns Hopkins University. Internet telephony has become widely used through consumer-centric applications such as Skype, and is becoming more common in enterprises. The new research suggests, however, that standard encryption and compression methods, ...

YouTube Addicts Beware

Monday, June 16th, 2008

From Web sites related to online banking, credit unions, financial departments, and social networking sites, phishers are chucking their rods into relatively new territory: video streaming sites. Trend Micro Content Security team learned about this latest (and very interesting) phishing technique a few days back. Several phishing domains (see Figure 1) ...

Details emerge of Safari “carpet bomb” flaw

Monday, June 16th, 2008

The vulnerability known as the Safari carpet bomb has still not been fixed, despite Microsoft releasing a security update for Internet Explorer last Tuesday evening. The consensus is that Microsoft's browser is the main cause of the problem, which can create a security hole in combination with Apple's Safari. When Internet ...