Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

WEP Cracking Cheatsheet

This is nothing new and most of the attack detail comes from the excellent Hacking Exposed: Wireless Second Edition, I just wanted a quick reference sheet for the commands to crack a WEP network. I’m...

View Article


Image may be NSFW.
Clik here to view.

Black Friday: Security team warns against malicious iTunes emails

Here’s a note of caution for all those bargain hunters presently slavering at the prospect of securing some tasty Black Friday deals: A team of vigilant security experts in Germany are today advising...

View Article


Image may be NSFW.
Clik here to view.

journald log hash chaining is broken

I promised to dig into some of the details of the journald announcement. One of the most hyped features is log hash chaining. Lennart describes this in his paper as follows (highlighting by me): The...

View Article

Image may be NSFW.
Clik here to view.

Verizon Galaxy Nexus LTE release date rumor:

Verizon Galaxy Nexus LTE release date rumor: Nov 29#tlv Verizon Galaxy Nexus LTE release date rumor: Nov 29

View Article

Image may be NSFW.
Clik here to view.

Will the UK Cyber Security Strategy make a difference?

The British government has today published its Cyber Security Strategy detailing how it plans to protect national security and the public from internet threats, and (hopefully) support the British...

View Article


Image may be NSFW.
Clik here to view.

Protecting Kids Online

Image via Wikipedia One of the issues I’ve been struggling with over the past ten or so years is how to protect kids online. The Internet offers a world of opportunities. People of all ages share...

View Article

Image may be NSFW.
Clik here to view.

Twelve days of Phishmas – 2011

Phishers are thankful for how generous so many Internet users have been in 2011. As they did in 2009 and 2010, carolers are filling IRC channels with the merry sounds of Phishmas anew! Photo by Lucci...

View Article

Image may be NSFW.
Clik here to view.

Levitator: Root on your Android phone

A few days ago, Jon Larimer and Jon Oberheide published a vulnerability for Android platforms < 2.3.6. David Maciejak and I were curious to run it on an Android phone. Result: it runs perfectly :(...

View Article


Image may be NSFW.
Clik here to view.

Another graph of an elliptic curve

After playing with the graphing program on my son's iPad for a while, I tried using it to plot a few 3-dimensional graphs. The first thing that I tried was to look at the elliptic curve y2 = x3 - 2x +2...

View Article


Image may be NSFW.
Clik here to view.

Probabilistically, Not.

Conveyed to my overtaxed attention, via BoingBoing’s Maggie Koerth-Baker comes, likely, the most succinct, self-referencing abstract within any specific scholarly paper I have examined [evidently,...

View Article

Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Guess Who’s Coming For Dinner

Tech humor from Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

13 million MapleStory players at risk after hack – casting a cloud over...

If you're about to float your video game company on the stock exchange, probably the last thing you want is for a hacker to break into the personal details of some 13 million of your players.

View Article

Image may be NSFW.
Clik here to view.

Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK

Until I got a copy of Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK, I have never heard of the term sousveillance. It is defined as both the recording of an activity by a...

View Article


Image may be NSFW.
Clik here to view.

What I don’t like about journald / Linux Journal

I heard of journald only a couple of hours ago (Tuesday?) and since then some intense discussion is going on. I had a chance to look at the journald material in more depth. I also had a quick look at...

View Article

Image may be NSFW.
Clik here to view.

Do I need to hit ‘Cancel’ to not cancel?

Do I need to hit 'Cancel' to not cancel? And where is the 'Yes' button?Source: http://thedailywtf.com/Articles/X-Marks-the-Close.aspx (#4)

View Article


Image may be NSFW.
Clik here to view.

XSS Deep Dive

While on the topic of research papers, I came across another interesting paper on the UC Berkely web site while checking the reference for the effect of development tools on security. Joel Weinberger,...

View Article

Image may be NSFW.
Clik here to view.

Job: Security Engineer II in Fairfax, VA

Looks like a great job opportunity has turned up over at the NoVA Hackers Association’s  facility host. I know several of the folks that work in their security department over there and it seems like...

View Article


Image may be NSFW.
Clik here to view.

SSCC 77 – Thanksgiving patching, SCADA, Google WiFi mapping and Android security

Paul Ducklin joins Chet to talk about this week's news including giving your friends and family a hand at Thanksgiving, Android security, SCADA hacking and Google's WiFi mapping opt-out scheme.

View Article

Image may be NSFW.
Clik here to view.

Safeguards for ethical hackers spurned by Australian government

The Australian government has thumbed its nose at legal safeguards for ethical hackers, according to security researcher Alana Maurushat. industry professionals say they went out of their way to submit...

View Article

Image may be NSFW.
Clik here to view.

Spam attack hits Facebook’s own Help Center

Spammers use the Thanksgiving holiday as an opportunity to swamp Facebook's own Help Center with spam messages.

View Article
Browsing all 37364 articles
Browse latest View live