Researchers use browser to elude Vista memory protections Black Hat: Two researchers Thursday will demonstrate how to use Java, ActiveX controls and .NET objects to essentially bypass all the key security safeguards in Windows Vista.
MySpace, Facebook ignoring basic principles of security Social networking websites MySpace and Facebook present a significant security risk to users, largely because their wide-open application programming interfaces (APIs) are a tempting target for malicious hackers. Hacking techniques compromise Microsoft Vista heap Black Hat: Ben Hawkes, an independent researcher, demonstrated several scenarios in which Microsoft Vista can be compromised by hackers via its main storage memory. Vista functionality still wins over security A researcher renowned for tinkering with Active X controls tossed a pail of ice water today at Black Hat on the security-first marketing associated with Vista. Positive changes coming to ModSecurity A big gap in the popular open source Web application firewall is addressed via a new tool called ModProfiler that establishes a baseline of Web application behavior and feeds that intelligence to ModSecurity. Researchers develop lightweight Cisco IOS rootkit Building on previous research against IOS, Core Security researchers have theoretically shown the plausibility of an IOS rootkit attack. Bluetooth 2.1 is easy to crack Black Hat: A cryptographer for Aladdin Knowledge Systems says Bluetooth version 2.1, designed to be more secure than previous versions, is actually extremely vulnerable to attackers. Kaminsky: DNS flaw capable of attacks on many fronts Network security researcher Dan Kaminsky outlined more than a dozen ways the DNS cache poisoning flaw could be exploited by an attacker to wreak havoc on vulnerable systems. Black Hat buzz grows around Vista exploit briefing According to sources, a pair of researchers Thursday will reveal new ways in which attackers can bypass Windows Vista security features. Mozilla to release Firefox threat-modeling data The Mozilla Foundation's security chief says it will soon publicly release threat-modeling data for the next version of the Firefox Web browser. Microsoft to revamp patching, add exploitability index Microsoft plans to give some security vendors early access to vulnerability information prior to the patch release. Hoffman to demonstrate new hacking techniques Researcher to demonstrate hacking methods that enable malware authors to shield their programs from analysis. EV SSL certificates won't stop phishers, researchers say Two researchers call Extended Validation (EV) SSL certificates a Band-Aid approach, and share their research of the phishing underground. Valuable lesson emerges from DNS flaw handling Any effort to prevent others in the legitimate security community from working out the problem is a waste of time.
|
Start the conversation
0 comments