<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Slashdot | Spam Is 30 Years Old

April 27, 2008

Slashdot | Spam Is 30 Years Old: "New Scientist commemorates spam's 30th anniversary, a week from today."

Source: slashdot

Thieves use Eee PC in Brazilian ATM scam

InternetNews Realtime IT News - Is it Right For Hackers to Fight Fire With Fire?

InternetNews Realtime IT News - Is it Right For Hackers to Fight Fire With Fire?: "It all sounds very Independence Day (no word on whether Jeff Goldblum figured out how to do the hack) but it does raise a legal question: Is it right to fight the hackers using the same dirty tricks they use?"

Source: internetnews

BBC NEWS | Technology | Hackers warn high street chains

BBC NEWS | Technology | Hackers warn high street chains: "That's the beauty of asymmetric warfare. You don't need a lot of money, or an army of people. You can do it from the comfort of your living room, with a beer in your hand."

Source: bbc

Designing and implementing malicious hardware

"Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the software are unexplored, as are the countermeasures an attacker may take to bypass proposed defenses."

Source: usenix