Cain & Abel 4.9.32 released

Friday, September 25th, 2009

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...

Critical iTunes flaw exposes Mac, Windows to hacker attacks

Tuesday, September 22nd, 2009

Apple has shipped iTunes 9.0.1 to fix a critical security hole that puts Mac and Windows users at risk of computer takeover attacks. The vulnerability could be used by hackers to launch code execution attacks via booby-trapped “.pls” files, Apple warned in an advisory. Source: http://blogs.zdnet.com/security/?p=4379

VirtualBox 3.0.6 released

Thursday, September 10th, 2009

VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software. Sun today released VirtualBox 3.0.6, a maintenance release of VirtualBox 3.0 which improves stability and performance. See the ChangeLog for ...

Web-monitoring software gathers data on kid chats

Tuesday, September 8th, 2009

Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and ...

Microsoft To Release Five Critical Patches Tuesday

Saturday, September 5th, 2009

Microsoft will roll out a total of five critical patches for numerous versions of Windows operating systems in its upcoming September "Patch Tuesday" security update release, according to a Microsoft Advanced Notification bulletin posted Thursday.All five patches plug holes that allow remote code execution, indicating that hackers could remotely exploit ...