Laptop Lojack Vulnerability Exposed

Friday, July 31st, 2009

A pair of computer security researchers have discovered a BIOS vulnerability caused by the Computrace Laptop Lojack software, serving as a rootkit to potentially let malware nest and thrive in an estimated 60% of newish laptops. The research team of Alfredo Ortega and Anibal Sacco say that when malware infects a ...

Massive Botnet Stealing Financial Info

Thursday, July 30th, 2009

A ferocious piece of malware that's infected up to a million PCs is stealing a "tremendous" amount of financial information from consumers and businesses that log on to their bank, stock broker, credit card, insurance, job hunting and favorite e-shopping sites, a noted botnet researcher said today. "Clampi is the most ...

VirtualBox 3.0.0 Released

Tuesday, June 30th, 2009

VirtualBox is a family of powerful x86 virtualization products for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the ...

Firefox 3.5 Released

Tuesday, June 30th, 2009

Firefox 3.5 is based on the Gecko 1.9.1 rendering platform, which has been under development for the past year. Firefox 3.5 offers many changes over the previous version, supporting new web technologies, improving performance and ease of use. Some of the notable features are: Support for the HTML5 <video> and <audio> ...

Capturing Keystrokes With Metasploit

Monday, June 22nd, 2009

I was contacted privately about this, so I thought I would post a step-by-step guide on how to capture keystrokes from a target machine using Metasploit. Instead of posting a ton of screenshots, I will provide the commands in text below, step-by-step: msf > use exploit/windows/smb/ms08_067_netapi (only an example - use whatever ...