Expert analysis
Tunnelling HTTP Traffic Through XSS Channels
An XSS Channel is an interactive communication channel between two systems which is opened by an XSS attack. At a technical level, it is a type of AJAX application which can …
Running the PuTTY SSH Client on a Nokia E61
PuTTY allows you to use your Symbian-powered mobile device to connect securely to a remote computer no matter where you are located. The software is free and it enables you to …
Know The Enemy Within
Have you ever wondered about exactly how much of a threat your users are to your organization? Well, wonder no more, as an in depth study by Queens University, Belfast and …
Preventing Spam with Unique Disposable E-Mail Services
I really don’t need to talk about the current situation with spam on the Internet. I have 10+ mailboxes, all of them receiving at least 50 spam e-mails per day, but I …
Easy Packet Sniffing on Mac OS X
If you have more than one workstation, you administer several machines connected to a network, or just frequently connect to various networks, sooner or later you’ll …
The Evolution of Self-Defense Technologies in Malware
This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also …
Apache Prefork MPM Vulnerabilities
This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the …
Taking Ownership of the Trusted Platform Module Chip on Intel Macs
I have been following the works of Trusted Computing Group (TCG) since their inception. The body, successor to the Trusted Computing Platform Alliance started by such giants …
Cisco IOS Exploitation Techniques
It’s been almost two years since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a …
The State of Database Security
Ted Julian is the VP of Marketing and Strategy at Application Security Inc. In this video he discusses the current state of database security and offers some insight on what …
Firefox Security and Privacy Extensions
In the last few years Firefox gained a massive support from surfers worldwide. This is mainly because Internet Explorer, still the biggest player on the market, has proved to …
U3 USB Stick (In-)Security
USB sticks are THE Trend. They combine memory space and high data rates, they are small, lightweight, and are rewritable thousand times. New USB sticks often come with U3 …
Featured news
Resources
Don't miss
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol