Please login first.

Researchers warn of AV software risks


The vulnerabilities in antivirus software make the programs as much a threat, as a help, to corporate network security, two German security experts argued in a presentation released last week.

The researchers -- Sergio Alvarez and Thierry Zoller, both of German security firm N.runs -- have taken antivirus companies to task for a large number of vulnerabilities the two discovered in how virus scanners parse potentially malicious files. While antivirus software is a typical piece of companies' defense-in-depth strategy, security holes in the software could allow an attacker to bypass other defenses, the pair argued.

securityfocus.com

... Link (0 comments) ... Comment



Rogue nodes snoop on TOR traffic


Researchers have uncovered more evidence that the TOR anonymiser network is being misused by hackers, and quite likely government intelligence agencies.

TOR (The Onion Router) is a network of proxy nodes set up to provide some privacy and anonymity to its users. Originally backed by the US Naval Research Laboratory, TOR became an Electronic Frontier Foundation (EFF) project three years ago. The system provides a way for whistleblowers and human rights workers to exchange information with journalists, among other things. The system also provides plenty of scope for mischief.

theregister.co.uk

... Link (0 comments) ... Comment



Did NSA Put a Secret Backdoor in New Encryption Standard?


Random numbers are critical for cryptography: for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random-number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency.

wired.com

... Link (0 comments) ... Comment



Wir speichern nicht!


wird ein Netzwerk von Webseiten, deren Benutzung nicht personenbezogen nachvollzogen werden kann.

Wie beim Lesen eines Buches oder beim Versenden eines Briefes stellen wir sicher, dass dem Nutzer auch im Internet niemand über die Schulter blicken kann. Nur bei Protokollierungsfreiheit können die Nutzer unbefangen lesen, schreiben und diskutieren.

wirspeichernnicht.de

... Link (0 comments) ... Comment



Top 10 Uncracked Codes


Until quite recent history, the writing of the Ancient Egyptians was a secret to man. Eventually, with the help of the Rosetta stone, Jean-François Champollion was able to solve the ancient mystery. Since that time, there have been many other attempts to decipher ancient languages, or to crack codes that have been made for fun or fortune. This is a list of the ten most famous ciphers and writing systems that are still unsolved.

listverse.com

... Link (0 comments) ... Comment



Leben mit der Vollüberwachung - Chaosradio Podcast Network [mp3]


In einer gigantischen Operation hat das Bundeskriminalamt einen Berliner Soziologen und sein gesamtes Umfeld über mehr als ein Jahr hinweg komplett überwacht. Der Verdachtsgrund: Ein paar Stichworte aus seinen Arbeiten, die mit denen aus Bekennerschreiben einer Gruppe von Brandstiftern übereinstimmen sollen. Die von der Überwachung Betroffenen – insgesamt mehr als 30 Menschen – haben jetzt teilweisen Einblick in ihre Akten bekommen.

chaosradio.ccc.de

... Link (0 comments) ... Comment



World's Smallest Camcorder Launched


Introducing the Micro-Camcorder super compact video/audio camcorder. Smaller and lighter than a disposable cigarette lighter yet packed with high quality features.

This Micro Camcorder records Hi-Resolution (3gp) real time (15fps) video via its internal pin hole camera at the touch of a button. Recordings are stored on a tiny removable Micro SD card. Up to 33 hours of video can be recorded on a 1Gb Micro SD card. Internal rechargeable battery is recharged via USB connection.

World's Smallest Camcorder Launched

spygadgets.com

... Link (0 comments) ... Comment



Pentagon Spy Cam Modeled After Maple Seed - Nano Air Vehicle (NAV) PROGRAM


Americans are facing a brave new world of post-September 11 technology marvels that could soon find their way into billions of dollars of projected homeland security spending.

Gee-whiz know-how -- from swarms of tiny airborne sensors to ever-sharper satellite imagery -- is being developed by companies chasing potentially lucrative federal, state and local deals to address 21st-century security threats.

Pentagon Spy Cam Modeled After Maple Seed

sciam.com Nano Air Vehicle (NAV) PROGRAM [pdf]

... Link (0 comments) ... Comment



Hacking group alleges attack via PDF


The hacking group GNUCitizen claimed on Thursday to have found a critical flaw in Adobe's Portable Document Format (PDF) format that could let an attacker compromise a computer running the Windows operating system, if the user opens a specially-crafted PDF file.

securityfocus.com

... Link (0 comments) ... Comment



Tor at heart of embassy passwords leak


Tor advertises itself as a means for people and groups to improve their privacy. And when used properly, the distributed, anonymous network does just that. But a Swedish security consultant has used the very same system to gain access to login credentials for a thousand or so individual email addresses, including those of at least 100 accounts belonging to foreign embassies.

Dan Egerstad, who made waves last week posting the login details to embassies belonging to Iran, India, Japan and Russia, among others, has finally identified how he got access to the information.

theregister.co.uk

... Link (0 comments) ... Comment



Hack The Vote 2008


This edition of The Listening Post from Homeland Defense Week focuses on the latest news surrounding the security of electronic voting systems.

I've covered e-voting for more than three years, going back to my news reporting days and the first revelations that electronic voting systems were wide open security nightmares waiting to happen.

podtech.net

... Link (0 comments) ... Comment



'Big Brother' plan for police to use new road cameras


"Big Brother" plans to automatically hand the police details of the daily journeys of millions of motorists tracked by road pricing cameras across the country were inadvertently disclosed by the Home Office last night.

Leaked Whitehall background papers reveal that Home Office and transport ministers have clashed over plans for legislation this autumn enabling the police to get automatic "real-time" access to the bulk data from the traffic cameras now going into operation. The Home Office says the police need the data from the cameras, which can read and store every passing numberplate, "for all crime fighting purposes".

guardian.co.uk

... Link (0 comments) ... Comment