NASA scientists have begun to computerize human, silent reading using nerve signals in the throat that control speech. In preliminary experiments, NASA scientists found that small, button-sized sensors, stuck under the chin and on either side of the “Adam’s apple,” could gather nerve signals, and send them to a processor and then to a computer […]
What is the big picture when it comes to Apple security? Is OS X safe enough to be a viable contender for running public Web sites and general enterprise applications?To many Mac users, the recent news report of an Apple OS X security vulnerability seemed like an anomaly. While Windows users are greeted almost weekly […]
Rootkit scanner is scanning tool to ensure you for about 99.9% you’re clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: MD5 hash compare, look for default files used by rootkits,wrong file permissions for binaries, look for suspected strings in LKM and KLD modules, look for hidden […]
This paper will introduce the reader to an ICMP communication type (this is done by hooking a particular syscall). With this technique is possible to start a communication client/server without open a port on the remote system. A basic knowledge of C language and of syscall hooking is required.
It looks like bzip2 bombs are not the only ones that can cause problems. Decompression bombs in general are causing problems. Compression is used in many applications, but only seldom maximum size limits are checked during decompression of untrusted content. Impacts: – simple bombs: compressed binaries containing a huge amount of the same char (binary […]
A 19 year-old Ashdod resident was arrested today on suspicion that he broke into Pennsylvania police computers and disrupted police databases. The suspect purportedly attempted to delete some criminal records and copy classified information onto his own computer.
iPod and iTunes are digital music’s top act, but the hip Richard Branson’s marketing muscle makes him a challenger to be feared The honeymoon was nice while it lasted — Apple’s digital-music honeymoon, that is. On May 8, Brit billionaire Richard Branson jumped into the game with an announcement that his Virgin constellation of airlines, […]
A new variant of the Sober worm has surfaced this morning, antivirus specialist F-Secure has warned. Sober D pretends to be a Microsoft software update that protects against a new version of the MyDoom worm. Once activated the worm displays a patch loading screen, but harvests email addresses and mails itself out using its own […]
International terrorist groups tied with Islamic fundamentalists are preparing unprecedented attack on the Internet. Consequences of this attack can be compared with September 11 disaster. Terrorists aim at computer systems of large economical and financial centers of the West.
Search ASM Code Tool for Overflow exploit.