[ad] Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a […]
computer-security
Firefox Extension Spyware – FormSpy
The antivirus specialists at McAfee have warned of a Trojan that disguises itself as a Firefox extension. The trojan installs itself as a Firefox extension, presenting itself as a legitimate existing extension called numberedlinks. It then begins intercepting passwords and credit card numbers entered into the browser, which it then sends to an external server. […]
IBM Accused of Hacking
This is actually a very important case depending on which way it goes. It could become a landmark case in regards to liability for machines on your network, or actually any traffic originating from your IP range. A boutique Washington, D.C.-based law firm is accusing IBM of hacking into its e-mail system and is seeking […]
Consultant Breached FBI’s Computers
[ad] Using standard script kiddy tools a consultant managed to compromise some of the FBI’s computers containing confidential information. Quite a hack eh? A government consultant, using computer programs easily found on the Internet, managed to crack the FBI’s classified computer system and gain the passwords of 38,000 employees, including that of FBI Director Robert […]
HoneyBot – A Windows Based Honeypot
HoneyBOT HoneyBOT is a Windows based medium interaction honeypot solution. What is a Honeypot? A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the […]