Google announced via his Official Gmail Blog the support of TIFF and Powerpoint files in their Gmail application. PDF files were already supported for a while. For a few months, PDF files have been hit by several security issues and recently, a zero-day exploit targeted Powerpoint files. Why not use
Category: Websites
How a Buffer Overflow Works
Seen on blog.wired.com, a very good explanation about a buffer overflow attack (a very common method to compromize a system or application): blog.wired.com/27bstroke6/2009/03/conficker-how-a.html.
Virtual Banking, Real Risks?
Announced on BBC News, Mindark, the developers of Entropia, get their license to perform on-line banking! Entropia is an online game defined as “The first virtual universe with a real cash economy”. The Swedish Financial Supervisory Authority accepted and issued a license to Mindark. It allows players to convert their
Introduction to SEAT
SEAT – Search Engine Assessment Tool – is a tool dedicated to security professionals and/or pentesters . Using popular search engines, it search for interesting information stored in their caches. It also uses other types of public resources (see later). Popular search engines like Google or Yahoo! (non-exhaustive list) use
Oups! Gmail Undo Function
Gmail Labs are back with a new feature for Gmail… A few months ago, they introduced a feature to help users to not send e-mails at the wrong moment (late night, after a party, …) Now, there are back with a new protection: An undo function! It’s very simple: once
Unsafe Customer Data!
I received the following e-mail yesterday. It came from a Belgian e-commerce website. It’s a company active in a very specific out-door activity (no name here, but if they are other customers reading my blog, they will for sure recognize the format). The customer base is restricted (but international). Sorry
Sorry, We Are Closed!
WTF! I just tried to buy some movie tickets @ Kinepolis. I received the message below. Since when e-commerce websites are closed like regular stores?
Search the Internet in a Safe Way
Most search engines are well-known to log your IP address when you perform a search request via their services. For each request, personal information are saved (IP address, timestamps, clicked results) and re-used later to build your “profile”. Why? First, to propose more accurate results when you use the search
Introduction to Nmap Scripting
All people working with networks know the wonderful tool called Nmap. Basically, Nmap is a network scanner. It allows you to detect hosts on a network and services running on them. Just type “nmap <hostname|ip>” to perform a simple port scan. But Nmap can do much more! Host discovery, multiple
Google != Internet
As said in a previous post, during a few minutes this afternoon, Google decided to tag all the websites as “potentially dangerous”. This was quickly fixed but immediately reported by several sites: SANS ISC Slashdot The Register (I’m sure it will be a buzz in the coming hours!) Google is