A new physing method appeared a few days ago: now stolen data are sent back to the attackers via ICMP packets! Source: WebSense: Malicious Code / Phishing Alert: Data Stolen via ICMP.
Category: Security
Compromized forum…
Yesterday, while browsing one of my favourites online forum, i was surprised to see it corrupted… A hidden frame with Javascript code, a nice xml.wmf… I contacted the forum admin. Site is currently down. 🙁
OpenSSH & files security
To sync files or export data between servers, I usually use rsync on top of ssh. With public/private key pairs, you can easily automate the jobs via a cron without password issues. I also create a dedicated user who has only the required privileges to run rsync on the destination.
Top Ten passwords in UK
thomas arsenal monkey charlie qwerty 123456 letmein liverpool password 123 Of course this list comes from a study in UK (Liverpool and Arsenal are in good positions) but it must be the same everywhere. I’m sure that the same list in Belgium should contain “Standard” or “Bonnen” 😉 That’s another
Correct password policy?
Passwords?
2005 is over, it’s review time!
Here is a review of all vulnerabilites discovered in 2005: http://www.us-cert.gov/cas/bulletins/SB2005.html
Better than the MTV Music Awards or Golden Globes…
Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Thousands of organizations used that list, and the expanded Top-20 lists that followed one, two, and three years later, to prioritize their efforts
IT & hurricanes?
Katarina will reach the US coast soon… Once personal & family safety is warranted, why not take care of IT & Internet? There is an interesting article @ SANS regarding this topic: Article: Hurricane Katrina Preparations
Format your old disks!
Are you selling old hard disk drives on Ebay from time to time? Sure, it’s a great way to get some money back against unused hardware! But, did you always take care of their content? How do you format them? Read this story: Old hard drives yield data bonanza. For
Code to exploit Windows graphics flaw now public!
Descovered a few days ago, this new security breach can now let someone to take remote-control of the infected Windows box! To be safe, you should not download any JPEG files with Explorer 😉 See http://asia.cnet.com/news/security/0,39037064,39194791,00.htm Need to surf safely? Try this 😉