Jan 2006 Virus and Spam Statistics

January at a glance: Vicious and Varied The numbers are indeed concerning: 19 new email-born significant virus attacks, of which a troubling 8 (42%) were graded “low intensity”, 7 (37%) “Medium Intensity” and 4 (21%) were massive attacks & a rare phenomenon for a single month. One outbreak of specific interest, consisting of 7 variants, […]

Tags: , , , , , , ,

Posted in: Malware | Add a Comment

Google has no license for China service

Internet search giant Google Inc.’s controversial expansion into China now faces possible trouble with regulators after a Beijing newspaper said its new Chinese-language platform does not have a license. The Beijing News reported on Tuesday that Google.cn, the company’s recently launched service that accommodates the China’s censorship demands, “has not obtained the ICP (Internet content […]

Tags: , , ,

Posted in: General News, Web Hacking | Add a Comment

Antitrust case against Apple approved

Back in September, we posted about Thomas Slattery, an unhappy iTunes user who filed a class action lawsuit against Apple alledging that Apple has a monopoly over the digital music and digital music player market with iTMS and iPods. Back then, the judge dismissed a number of items in Apple’s favor, but didn’t dismiss the […]

Tags: , ,

Posted in: Apple | Add a Comment

Severe Security Hole in Apple Mac Safari Web Browser

As the German IT portal heise online conveys, a new security hole in the Safari webbrowser for Apple’s Mac OS X has been discovered. This security hole is rather severe, as it invokes the execution of shell scripts under certain circumstances. Once again the Safari option “open safe” files automatically after download bears the blame. […]

Tags: , , , , ,

Posted in: Apple, Web Hacking | Add a Comment

Google’s Defense of Privacy – Tells Feds to BACK OFF

Google has offered multiple reasons why it shouldn’t have to comply with a Justice Department subpoena. One is privacy. An excerpt: If Google is forced to compromise its privacy principles and produce to the Government on such a flimsy request, its search query and URL data, Google will, without a doubt, suffer a loss of […]

Tags: , , , , ,

Posted in: General News, Privacy | Add a Comment

Spanish ‘Super’ Hacker Jailed for 2 Years over DoS attack

A Spanish hacker who launched a denial of service attack that hobbled the net connections of an estimated three million users has been jailed for two years and fined 1.4m. Santiago Garrido, 26, (AKA Ronnie and Mike25) launched the attack using a computer worm in retaliation for been banned from the popular “Hispano” IRC chat […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment
NSA Nmap

NSA Tracking Nmap and Other Open Source Tools

Check it out! US President George W. Bush visited the NSA headquarters at Fort Meade in January 2006. A wall-sized status screen in the background displays the latest versions of Nmap and some of our other favorite open source tools. Pictures were printed in the February 6, 2006 edition of Newsweek (article) and the Jan […]

Tags: , , , ,

Posted in: General News, Hacking Tools | Add a Comment

Locate anyone in the UK via SMS

By using one of the many mobile phone location tracking services aimed at businesses or concerned parents, and some trickery it is possibly to get almost anyone’s mobile phone position without their agreement. All that is required is their mobile phone number, and carrier. Over the past year a number sites have popped up offering […]

Tags: , , , , , , , , , , ,

Posted in: Telecomms Hacking | Add a Comment
BackTrack

BackTrack – A merger between WHAX and Auditor

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions namely Whax and Auditor. Combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out. Based on SLAX (Slackware), BackTrack provides user modularity. This […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Security Software | Add a Comment