What happened to Google this afternoon (16:00 GMT+1)? Suddenly, all websites are reported as “suspicious”:
Category: Websites
Book Review: Learning Nagios 3.0
I received a copy of Learning Nagios 3.0 for review. The book was written by Wojciech Kocjan. As I’m a Nagios users for years now (started around 2000 if I’m right), I was interested in learning more about the new 3.0 features. IMHO, Nagios is one of the most powerful
Nothing happened in Belgium?
I read today that the Belgian crisis center decided to raise the alert level due to the Isreali-Palestinian conflict. This alert level is managed by the Ministry of Internal Affairs. I decided to visit their website for more information. Maybe more details will be provided online: what’s the current status?
You Asked the Webmaster? Hold the Line Please…
A few days ago, I accidentally discovered a security flaw in a public forum dedicated to a well-known security software solution. No “high-level” attack but something really dumb. During the registration process, I pasted a wrong string in the registration page. My clipboard still contained some basic HTML tags. All
PaulDotCom Goes TV (again)
Big fan of PaulDotCom for a long time, I listen to the Security Weekly postcast every week in my car (that’s the positive side of traffic jam in the morning ;-) They also broadcasted videos for a long time but the last episode was posted in May 2008. They are
Security from A to Z
Found on silicon.com: “Security from A to Z”. Click on the links below to find out more… A is for Antivirus B is for Botnets C is for CMA D is for DDoS E is for Extradition F is for Federated identity G is for Google H is for Hackers
Good Bye 2008…
2008 is almost gone and lots of “Top-ten” charts were already published. What happened during the last months? Top 10 Coolest Hacking Moments in 2008 2008’s top ten most-searched tech terms 10 Emerging Technologies 2008 Gartner Identifies the Top 10 Strategic Technologies for 2008 Top 10 Most Pirated Games of
Simple DLP with Ngrep
DLP stands for “Data Loss Prevention” or sometimes, “Data Leak Protection“. Companies primary goal is to make business. And their activities rely on their data (customers, databases, research results, statistics, source code, …). DLP is a security process which takes care of: monitoring, identify and protection of the data. The
Strange Spam via Google Docs
During the last 24 hours, I started to received a lot of spam messages based on Google Docs. The e-mails look like: From: <random address> To: <me> Subject: Monthly Payments Keep Rising. If you are one of the many homeowners whose payments are high and home values are low, or
Malicious Firefox Add-on Steals Passwords
It was reported by the French version of The Inquirer: it seems that a new malware is spread over the Internet presented like a false Firefox add-on! Discovered by BitDefender, the anti-virus editor, the malware was named Trojan.PWS.ChromeInject.A. It does not spread by itself and his installed in the local