Changes

From Security Weekly Wiki
Jump to navigationJump to search
1,698 bytes added ,  02:05, 11 January 2007
no edit summary
It's really hard to tell the difference between a program that works and one that just appears to work"
[http://www.cbc.ca/technology/story/2007/01/10/rfid-defence.html "bugging" coins with RFID] - [Joe] - "Canadian coins containing tiny transmitters have mysteriously turned up in the pockets of at least three American contractors who visited Canada, says a branch of the U.S. Department of Defence. Security experts believe the miniature devices could be used to track the movements of defence industry personnel dealing in sensitive military technology."[Larry] - Holy crap! Besides the potential tracking and provacy issues, I want one! Any Canadians care to send me one? [http://www.damninteresting.com/?p=776 We are controlling transmission] - [Larry] - This hack is old, but very neat. Chicago, Novermber 22, 1987, Chicago land viewers for to see Max Headroom and a naked butt on the TV instead of Dr. Who. Apparently someone was able to inject their own data in to a licensed microwave transmission array. Alegedly, the equipment could have been rented for about 25K, or built by hand. Either way, it was illegal to operate - just because it is illegal or expensive, doesn't mean hackers won't do it
[http://news.com.com/Flaw+found+in+Apple+bug-fix+tool/2100-1002_3-6148606.html Apple's Bug Fix tool...is Buggy!] - [Joe] - "Vulnerability researchers behind the "Month of Apple Bugs" project, which aims to publish one flaw per day throughout January in software used on Apple platforms, announced on Monday that they have found a vulnerability in a tool that is used by a group involved in finding fixes for the flaws. APE is a third-party piece of software, written by Unsanity, designed to "enhance and redefine" the behavior of applications running on Apple platforms. APE loads plug-ins containing executable code into active applications. Month of Apple Fixes uses the software to apply run-time patches to the flaws found by the Month of Apple Bugs project. The patches insert themselves into applications when they run, find the vulnerable code and apply themselves."
 
[http://www.theregister.co.uk/2007/01/09/scam_decline/ SPAM decline?] - [Larry] - Spam rose to unbelievable levels before the Holidays, now where did it all go? Rumor has it that a large botnet went all pear-shape. If the bot-nerder owns it, who does?
 
[http://applefun.blogspot.com/2007/01/canary-trap-leak-and-mole.html How to catch a mole] - [Larry] - More MOAB craziness. Release an "exploit" earlier to those trolling the site before releases. PWN3D!
 
[http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=22177&mode=thread&order=0&thold=0 Where's Nick?] - [Larry] - Lindend labs release the code to the second life client - Open Source.
 
[http://www.securityfocus.com/infocus/1885?ref=rss More Raul] - [Larry] - More of Raul's great article on wireless forensics.
 
[http://irongeek.com/i.php?page=security/networkprinterhacking#DoSing%20the%20network%20or%20the%20printer Irongeek's HP Printer hackin'] - [Larry] - Updated to include the FTP exploits a few shows ago. Adrian, Please drop Joe a note.
940

edits

Navigation menu