Archive for December, 2005
How the RIAA gets its victims

A detailed explanation on how exactly one gets sued by the RIAA. Lawyer Ray Beckerman, who's been working with Patti Santangelo in her defense, explains how “justice” is served, RIAA style…

read more | digg story

Security issues with Google's anti-phishing Firefox extension

That was quick – security issues found with Google's new anti phishing Firefox extension!

read more | digg story

Sober Worm Makes Pedophile Arrest

Generally, the word “computer virus” sends shivers down the spine of any computer user. These small, but deadly programs, obviously designed with the most malicious intentions, have done a lot of damage over the past few years. However, it seems that every now and then, viruses become vigilantes.

read more | digg story

DOJ posts social security numbers on web site

Working from a tip, names and SSNs of several people involved in DOJ investigations were found to be accessible on their public website with a minimum of effort. If the .gov is this bad, how can they expect businesses to be better?

read more | digg story

The most hated IP address of 2005

Time for a little hall of shame. Is there any IP address range or individual IP address that was annoying the daylight out of you in 2005? An address where you tried and tried to contact the ISP to have a malware, botnet controller, exploit page removed, but to no avail? Where exploits kept coming back again and again ?

read more | digg story

Home Network Firewall Guide

A good overall guide to home network security and PC firewalls.

read more | digg story

Happy Holidays: We've Lost All Your Critical Data

Over 200,000 employees, time share owners and customers. Included in the data were every identity thief's dream starter kit: names, social security numbers, bank account numbers and credit card numbers. To apologize, Marriott has agreed to spend the $100 or whatever to give everyone impacted a free credit monitoring service.

read more | digg story

Essential Free Wireless Hacking Tools

Anyone interested in wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. Brought to you by Dan Hoffman, CISSP, CWNA and regular columnist for the new online magazine, The Ethical Hacker Network.

read more | digg story

Is the Pentagon spying on Americans?

A secret database obtained by NBC News tracks “suspicious” domestic groups. A 400-page DoD document based on the database and obtained by NBC News lists more than 1,500 “suspicious incidents” across the country over a recent 10-month period.

read more | digg story

How to Secure your Wireless Network

Great tips on how to secure a wireless network, covers every major point in my opinion. Everyone with a wlan should take a look at this article.

read more | digg story