<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Tool Physically Hacks Windows - Desktop Security News Analysis - Dark Reading

March 30, 2008

Tool Physically Hacks Windows - Desktop Security News Analysis - Dark Reading: "Winlockpwn, originally built two years ago, bypasses Windows’s authentication system and lets an attacker take over a “locked” Windows machine without even stealing its password."

Source: darkreading

Electronic gadgets latest sources of computer viruses - CNN.com

Electronic gadgets latest sources of computer viruses - CNN.com: "From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory: pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam."

Source: cnn

Security firms split over Phorm classification | The Register

Security firms split over Phorm classification | The Register: "In this instance it is the ISP that monitors your surfing and forwards the information to Phorm. It is not possible to use these cookies to identify the actual pages you browse without cooperation from your ISP. In addition to that, if we were to block Phorm cookies then we would prevent users from being able to unsubscribe from the service"

Source: theregister

Russian serfs paid $3 a day to break CAPTCHAs | The Register

Russian serfs paid $3 a day to break CAPTCHAs | The Register: "Brad Taylor, a Google software engineer, said internal evidence suggests that low-paid laborers in third-world countries (rather than compromised PCs) are being used to register accounts that are subsequently used to send spam.
'You can see it is clearly done by humans,' Taylor told the New York Times . 'There are patterns in the rate we find bogus accounts, like at night time and when people get off work' in particular locations around the world."

Source: theregister

The Associated Press: Some Viruses Come Pre-Installed

March 24, 2008

The Associated Press: Some Viruses Come Pre-Installed: "From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory — pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam.
Computer users have been warned for years about virus threats from downloading Internet porn and opening suspicious e-mail attachments. Now they run the risk of picking up a digital infection just by plugging a new gizmo into their PCs."

Source: AP

Kevin's Security Scrapbook: Security and Spying With Nanotechnology as Tiny Spy Dust Chips Track Your Movements

Kevin's Security Scrapbook: Security and Spying With Nanotechnology as Tiny Spy Dust Chips Track Your Movements: "Nox Defense has released an invisible perimeter defense technology, which combines high-resolution video pictures and radio frequency identification (RFID) tags, sometimes referred to as 'spy chips', to track assets and people in real time. The system allows security officers to see a theft or intrusion as it happens, and track a stolen object even if concealed inside a briefcase, under a jacket, or stuffed inside a sock."

Source: spybusters

The Argus Brighton Hove & Sussex news sport jobs and local information

The Argus Brighton Hove & Sussex news sport jobs and local information: "A fingerprint is something you are.
'If a fingerprint is stolen, your child may have problems proving who they are for the rest of their life.'"

Source: theargus

ID in the News» Blog Archive » Government fails to sell ID concept

March 22, 2008

ID in the News» Blog Archive » Government fails to sell ID concept: "It doesn,t matter what shape or form that I.D cards take .I do not trust this government to look after my personal detail,I have managed on my own for 49 years and do not require id cards or a national identity register to tell me who I am!"

Source: no2id

Nova, PPG test readiness for cyber war

Nova, PPG test readiness for cyber war: "'It's a crisis drill … to test our capabilities. It's designed to be a stretch. It escalates into a situation that would be complex for us to handle. And from that, we'll learn about our response capabilities,' he said."

Source: post-gazette

A Heart Device Is Found Vulnerable to Hacker Attacks - New York Times

A Heart Device Is Found Vulnerable to Hacker Attacks - New York Times: "To the long list of objects vulnerable to attack by computer hackers, add the human heart.
The threat seems largely theoretical. But a team of computer security researchers plans to report Wednesday that it had been able to gain wireless access to a combination heart defibrillator and pacemaker."

Source: nytimes

Security must evolve, CERT official says

Security must evolve, CERT official says: "The tendency is to want to start locking things down, so security is something that disables, not enables, business, according to Young.
It's still an area where boxes and technology rule, she said.
'Solving your security problems by buying another box is just wishful thinking. But security is bigger than that,' Young said."

Source: computerworld

Analysis: DHS stages cyberwar exercise - UPI.com

Analysis: DHS stages cyberwar exercise - UPI.com: "The war game, codenamed Cyber Storm II, will run Monday to Thursday, based at U.S. Secret Service headquarters in Washington. It is the second DHS biannual cyber-exercise, designed to test the ability of federal agencies and their partners in state, local and foreign governments and the private sector to respond to and recover from cyberattacks on their computer networks."

Source: upi

Quantum computers: technological deliverance or the end of security? - Security - iTnews Australia

Quantum computers: technological deliverance or the end of security? - Security - iTnews Australia: "Long lauded as the next generation of computing, quantum computing is expected to herald a world where technological advancement is no longer bound by Moore's Law. Scientists speculate the applications of quantum computing to range from more accurate clocks, to finding cures to modern day diseases and even to mapping the human brain."

Source: itnews

UW Computer Security Course Blog » Cold Temperatures Compromise Encryption Security

UW Computer Security Course Blog » Cold Temperatures Compromise Encryption Security: "Researchers at Princeton University have found a very interesting and different approach to bypassing encryption. It has been demonstrated that when dynamic random access memory (DRAM) is frozen to extremely low temperatures, it retains whatever data is currently loaded onto the chip for minutes or even up to hours."

Source: cubist.cs.washington

Newton Virus - Art virus for Mac

DCRepublican.com » Chinese Hackers Tell it How it is

DCRepublican.com » Chinese Hackers Tell it How it is: "ZHOUSHAN, China (CNN) — They operate from a bare apartment on a Chinese island. They are intelligent 20-somethings who seem harmless. But they are hard-core hackers who claim to have gained access to the world’s most sensitive sites, including the Pentagon."

Source: dcrepublican.com

Techworld.com - Hackers turn Google into vulnerability scanner

Techworld.com - Hackers turn Google into vulnerability scanner: "The hacking group Cult of the Dead Cow (CDC) this week released a tool that turns Google into an automated vulnerability scanner, scouring websites for sensitive information such as passwords or server vulnerabilities."

Source: techworld