What is the true value of a test scan and attack?

To test or not to test? We are constantly inundated over different advertisements, and have an inherent distrust of something new. The problem that a company has is that …    (picture of radar installation) the hackers are scanning the Internet for any machines they can access using free tools.   Scanning the Internet Is … Read more

Android Browser has bug which can cause malware downloads

Arstechnica has the story Browsers are generally designed to prevent a script from one site from being able to access content from another site. They do this by enforcing what is called the Same Origin Policy (SOP): scripts can only read or modify resources (such as the elements of a webpage) that come from the … Read more

Web servers in Copiers are vulnerable = copier can be hacked

Techworld has a DEFCON22 review of the 10 scariest hacks. If a printer can be hacked on the network, all the things you scan or print can be stolen, and once the hacker is on the network there can be additional hacks to gain additional control of your machines. Irongeek story on HPJetdirect hacks   … Read more

You think your firewall is safe from hackers?

The Internet Storm Center has a post about how to get information from computers on the Internet.   So you want to use the Internet?  If you want to use it, you have to be connected. If you are connected you can be scanned. Hackers will scan you until they find a vulnerability. There are … Read more

Heap overflow attacks cause problems and then exploit system

etutorials.org explains some Heap Overflow attacks   This is an important sentence and diagram( from the etutorials.org: “Where the details of stack overflow exploitation rely on the specifics of hardware architecture, heap overflows are reliant on the way certain operating systems and libraries manage heap memory. Here I restrict the discussion of heap overflows to … Read more