Skip to main content

Home/ Information Security/ Group items tagged blogs

Rss Feed Group items tagged

Skeptical Debunker

Sea World killer whale attack video leads to malware | Graham Cluley's blog - 0 views

  •  
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with content which appears to be ghoulish video footage of the animal trainer's death - but are really designed to infect visiting computers.
Robin Dale

Misconceptions About The USA Patriot Act and Data Security in the Cloud Sector - 1 views

  •  
    This blog post speaks about the misconceptions people are having about the USA Patriot Act and Data Security, especially in the cloud sector.
Kiran Kuppa

Applied Cryptography Engineering - Quarrelsome - 0 views

  •  
    "This article was written with several goals: to hurry along the process of getting Applied Cryptography off the go-to stack of developer references, to point out the right book to replace it with, and to spell out what you else you need to know even after reading that replacement. Finally, I wrote this as a sort of open letter to Schneier and his co-authors."
wolf hesse

http://blog.washingtonpost.com/securityfix/zlobpass.txt - 0 views

  •  
    sample
Seçkin Anıl Ünlü

Plugging the CSS History Leak at Mozilla Security Blog - 0 views

  • History Sniffing
  • Links can look different on web sites based on whether or not you’ve visited the page they reference.
  • The problem is that appearance can be detected by the page showing you links, cluing the page into which of the presented pages you’ve been to. The result: not only can you see where you’ve been, but so can the web site!
  • ...18 more annotations...
  • The most obvious fix is to disable different styles for visited versus unvisted links, but this would be employed at the expense of utility: while sites can no longer figure out which links you’ve clicked, neither can you.
  • David Baron has implemented a way to help keep users’ data private while minimizing the effect on the web, and we are deploying it to protect our users.
  • The biggest threats here are the high-bandwidth techniques, or those that extract lots of information from users’ browsers quickly.
  • The JavaScript function getComputedStyle() and its related functions are fast and can be used to guess visitedness at hundreds of thousands of links per minute.
  • we’re approaching the way we style links in three fairly subtle ways:
  • Change 1: Layout-Based Attacks
  • First of all, we’re limiting what types of styling can be done to visited links to differentiate them from unvisited links.
  • can only be different in color
  • the CSS 2.1 specification takes into consideration how visited links can be abused:
  • implement other measures to preserve the user’s privacy while rendering visited and unvisited links differently
  • Change 2: Some Timing Attacks
  • we are changing some of the guts of our layout engine to provide a fairly uniform flow of execution to minimize differences in layout time for visited and unvisited links.
  • when the link is styled, the appropriate set of styles is chosen making the code paths for visited and unvisited links essentially the same length.
  • Change 3: Computed Style Attacks
  • JavaScript is not going to have access to the same style data it used to.
  • Firefox will give it unvisited style values.
  • it’s the right trade-off to be sure we protect our users’ privacy.
  • fixing CSS history sniffing will not block all of these leaks. But we believe it’s important to stop the scariest, most effective history attacks any way we can since it will be a big win for users’ privacy.
Bart TheGuard

Kaspersky Lab discovers one of the most significant cyber-attacks ever! - 0 views

  •  
    Kaspersky Lab issued an important report on Monday (01.14.2013) about a major, extremely complicated cyber-attack that may have been operating since the year 2007. The famous antivirus company reported that it identified a sophisticated cyber espionage campaign, which targeted a wide range of government and diplomatic organizations located in Eastern Europe and Central Asia as well as in North America and Western Europe. That's some very powerful malware!
Zaid Mark

Fix Error Code 2 - Unable to install applications on your system - 0 views

  •  
    If you are failed to install an application, then you are likely to see error code 2 on your system. Luckily, there is a way out of it. You can fix Error code 2 by implementing the solutions provided in the video embedded below
Zaid Mark

Fix Blank/Empty Device Manager - 0 views

  •  
    As soon as you experience a non-working defective hardware, you will definitely consult your Device Manager to check out the issue. What if your Device Manager depicts an unpleasant behavior by refusing to show any device attached to your computer.
Zaid Mark

Corrupted System Files Causing Black Screen - 0 views

  •  
    Bumping into a Black Screen, while booting Windows 8 is one of the most reported issues of this operating system. As a matter of fact, this event has a number of preceding sources, and you can recover from it using several troubleshooting methods.
BluEnt Global

The Truth About Your SEO Contract That Could Save You Big Dollars - 0 views

  •  
    BluEnt reveals the top three factors impacting search engine optimization contract. Achieve the highest possible ROI with the best SEO pricing plan.
Sally Croft

The Best VPN of 2015 in the UK | Virtual Private Network Blog - 0 views

  •  
    This post answers why UK VPN service has become a must-have for every internet user in 2015? Further, we'll show you how to choose the best UK virtual private network amongst all.
Sally Croft

How to Stop Online Tracking Six Failsafe Ways - 0 views

  •  
    Six failsafe ways to stop online tracking for good. Follow these steps; stay secure and anonymous at all times.
  •  
    Six failsafe ways to stop online tracking for good. Follow these steps; stay secure and anonymous at all times.
wolf hesse

Denial of service denial | Science Blog - 3 views

  • However, current filters usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not. This consumes its resources and in the case of a massive DDoS can compound the problem.
  • The user's computer has to present a filter value for the server to do a quick check. The filter value is a one-time secret that needs to be presented with the pseudo ID. The pseudo ID is also one-time use. Attackers cannot forge either of these values correctly and so attack packets are filtered out.
  • Indeed, the IPACF takes just 6 nanoseconds to reject a non-legitimate information packet associated with the DoS attack.
David Szpunar

Even MORE Metasploit Tutorial Videos! - 0 views

  •  
    Links (by Security Monkey) to extensive Metasploit training videos on SecurityTube by the SecurityTube owner. Excellent ethical-hacker training!
1 - 20 of 31 Next ›
Showing 20 items per page