Blackberry 8100 DoS

Blackberry is a hugely implemented secure handheld based email client inside the RIM network. It can retrieve emails for you and notify you when you have new emails straight from your email server. There’s a Denial of Service potential in one of their devices, the … “Blackberry 8100 DoS”

Read More

Top 10 Tools

Data RecoveryAnti Virus-ToolsFirewall and IDSRemote-ToolsAnti-SpywareDeleterSniffersPort ScannersSecurity ScannersPassword CrackerWirelessCryptography

Read More

Windows Genuine Advantage (WGA) Contacts Home (even if you click cancel)

Microsoft officially admits that the WGA program will “contact home” even if the user clicks on cancel. Nonetheless, the software giants claim, no private information is transmitted through this, further claiming, this is kind of a survey done for WGA user experience. There’s been WGAs … “Windows Genuine Advantage (WGA) Contacts Home (even if you click cancel)”

Read More

Default Router Passwords

Most edge devices (like routers) come with a default passwords which normally is found at the quick setup guide or their manual. But if you are like me, people who don’t read manuals, a quick place to find your edge devices passwords would be http://www.routerpasswords.com. … “Default Router Passwords”

Read More

Apple QuickTime Player Remote Heap Overflow

Apple QuickTime Player is reported prone to remote heap overflow vulnerability (exploitable via remotely originated content). Only Windows users are currently affected. Please update to latest at http://www.apple.com/quicktime/win.html Full advisory can be found at: http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt

Read More

Kaspersky UPX vulnerability revealed

Problem processing packed files led to infinite loop. Details of a flaw in UPX processing in the Kaspersky anti-virus engine have been made available, a month after the release of a patch to fix the problem. The vulnerability, which was reported by iDefense, could be … “Kaspersky UPX vulnerability revealed”

Read More

PC Hardware Can Be A Malicious Rootkit

I guess, in time, you would need to run your Antivirus on hardware too to check for malicious code. I guess it would be an expensive exploit, nonetheless it could be exploiting hardware and storing itself in your hardware’s firmware. A good practice from now … “PC Hardware Can Be A Malicious Rootkit”

Read More

Nessus: Be an instant security auditor

I really like those some proclaimed security auditors who come to you and say they can “detect” security flaws in your products and charge you a butt load of money for it. I must say, they did some good work in convincing you. But seriously … “Nessus: Be an instant security auditor”

Read More

Best Antivirus & Ratings for 2007

I’ve summarized some tests performed by Av-comparatives.org, an independent AV research company. The ratings are Advanced+, Advanced, Standard and failed (as of Feb 2007) Results thanks to: http://www.av-comparatives.org/ Advanced+========1. Avira2. eScan3. F-Secure (yeah!)4. Gdata5. Kaspersky (I use this, proud to have blown 300++ on this … “Best Antivirus & Ratings for 2007”

Read More