Tag Archives: Exploit Code / Malware

Attack Vectors Through the Pragmatic Use of Steganography

– The BBC reports that Fujitsu has discovered pragmatic uses for steganography. Unfortunately, by redirecting the mobile phone’s browser automatically, this could lead to using these images as attack vectors. Here are some quotes from the BBC report: “The key is to take the yellow hue in…

Couldn’t Make it to RSA: Attended ISSA, New York Chapter

– There was a very interesting program at NYM ISSA today. Presentations included: * WINDOWS VISTA: DEFENDING NETWORKS AGAINST THE EMERGENT THREATS OF THE 21st CENTURY INTERNET * COMPLEX OF THREATS TODAY AND BEYOND * SHADOWSERVER * DETECTING ZERO DAY THREATS Here is a general link to today’s…

Vista Security: IE Data Execution Prevention

– Michael Howard blogs about how to configure IE to prevent data execution. Unfortunately it may break some plug-ins. Adobe rewrote their plug-ins to work under the new security policy. …

Hackers temporarily foil Vista Anti-Piracy Measures?

– This didn’t take long. According to the article, the hack to activate Vista without MS validation is only good for 180 days. That is… until someone figures out the next hack… Which, seemingly, is here. It rebuffs the first article I quoted and reported that the hack is permanent,…

Fox News: Another reason end users are filled with FUD!

– Here is a clip from Fox News titled ‘Computer Security.’ The report covers al Qaeda’s capability to harm our digital infrastructure. (You’ll most likely need to click on the ‘Computer Security’ link to start the clip.) Naturally the media — and Fox News in…