Monthly Archives: April 2007
Mac Hacked Via Safari Browser in Pwn-2-Own Contest
A zero-day vulnerability in Safari, the default browser for Apple's Macintosh operating system, allowed two MacBooks to crumble before the onslaught of a CanSecWest...
List of Malicious MS DNS Flaw Exploits Still Growing
Microsoft on Thursday night added to its Malicious Software Encyclopedia four new malicious programs attempting to exploit the unpatched Domain Name System flaw in...
Impress Chicks: Hack Your Car’s GPS
It is now possible to plant a bullfight on the highway to block your parents from coming home too early (SatNav Code 1456), plant...
Was I Too Tough on RHEL?
In my recent review of Red Hat's Red Hat Enterprise Linux 5 and its brand-new Xen virtualization features a bit of a hard time...
What Makes a Security Idiot?
I recently posted a list of my 12 Ways to Be A Security Idiot. This list was inspired by an older column (OK, rant)...
Dear Google: You should probably remove “Froogle” from your apps
Lesson #1 in brand management: It's harder than you think.I was just messing around with Google Web History and the Google Toolbar, and both...
Larrys Quest Hardly a Breeze
"I am sailing, I am sailing, home again cross the sea," rasped the Rumormonger, Rod Stewart-like. El Gato was in a nautical mood after...
To Encrypt or Not to Encrypt
On those occasions when it is deemed appropriate for an authorized employee to transfer confidential data to a removable storage device, a best practice...
Security Through Obscurity
While chock-full of other features, Secuwares Secuware Security Framework 4.0 specializes in requiring encryption for data saved to devices and network shares. However, the...
Oracle Reaches Out to Apps Partners
Oracle is forging a new path with partners in its applications business—a real cultural shift for the company—and its a direct result of two...