Real Cases Mode:
(Page 2 of 8)  < Prev  1 2 3 4 5 6 7  Next >
CALL FOR PAPERS: JDFSL Special Issue on International & Comparative Digital Forensics, Security and Law 2007-01-24
Prof.Dr. Pedro Luís Próspero Sanchez (pedro sanchez poli usp br)


Journal of Digital Forensics, Security, and Law
http://www.jdfsl.org/
Special Issue on International & Comparative Digital Forensics,
Security and Law
CALL FOR PAPERS

Submission Deadline: 31 January 2007

The globali

[ more ]  [ reply ]
Fwd: SF new column announcement: iPhone Trademarks: the Real Issues 2007-01-23
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- Forwarded message from Kelly Martin <kel (at) securityfocus (dot) com [email concealed]> --

The following front page column was published on SecurityFocus
today:

iPhone Trademarks: the Real Issues
by Mark Rasch
published 2007-01-22

Apple's iPhone announcement and Cisco's iP

[ more ]  [ reply ]
Fwd: SF new column announcement: A Hard Lesson in Privacy 2006-11-28
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The following column was published on SecurityFocus today:

A Hard Lesson in Privacy
by Scott Granneman
published 2006-11-27

Scott Granneman looks at a hard lesson in personal privacy and
security through the lens of a very public and well-known femal

[ more ]  [ reply ]
Fwd: SF new column announcement: Employee Privacy, Employer Policy 2006-11-03
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Employee Privacy, Employer Policy
by Mark Rasch
published 2006-10-31

Mark Rasch looks at two recent court cases where an employee's
reasonable expectation of privacy was more important than the
employer's ability to read any employee's e-mail - despi

[ more ]  [ reply ]
Fwd: SF new column announcement: Viruses, Phishing, and Trojans For Profit 2006-10-26
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The following column was published on SecurityFocus recently:

Viruses, Phishing, and Trojans For Profit
by Kelly Martin
published 2006-10-24

Following the 2006 International Virus Bulletin Conference, Kelly
Martin takes a look at the profit motives o

[ more ]  [ reply ]
Hackers in the House 2006-09-22
Mark Ryan del Moral Talabis (talabis gmail com) (1 replies)
This is a step by step analysis of an actual "break-in" in one of our
honeypots. The case exemplifies the typical hacker methodology /
behaviour in the first phases of a compromise.

http://www.philippinehoneynet.org/dataarchive.php?date=2006-07-24

Regards,
Ryan

--
Mark Ryan del Moral Talabis
MS

[ more ]  [ reply ]
Re: Hackers in the House 2006-09-23
Thorsten Holz (thorsten holz gmail com)
Fwd: SF new column announcement: Liar, Liar, and pretexting by Mark Rasch 2006-09-20
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The following Front Page column was published on SecurityFocus
today:

Liar, Liar, and pretexting
by Mark Rasch
2006-09-19

Mark Rasch details the legality of pretexting by putting it in
context with how it used, comparing it with legal forms of lying,

[ more ]  [ reply ]
Fwd: SF new article announcement: Analyzing malicious SSH login attempts 2006-09-12
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----- Forwarded message from Kelly Martin <kel (at) securityfocus (dot) com [email concealed]> --
- ---
The following Infocus technical article was published on
SecurityFocus today:

Analyzing malicious SSH login attempts
By Christian Seifert
2006-09-11

Malicious SSH login att

[ more ]  [ reply ]
eWeek.com: Hackers Hit AT&T System, Get Credit Card Info 2006-09-04
Daniel Jimenez (dgj1menez hotmail com)
Auugust 29, 2006
By Chris Preimesberger

AT&T revealed late Aug. 29 that an undisclosed number of unauthorized
persons had illegally hacked into one of its computer systems and accessed
the personal data-including credit card information-of about 19,000
customers who had purchased DSL equipment t

[ more ]  [ reply ]
Re: Re: Looking for information on logs from Mambo or Joomla 2006-08-24
eaxc eax co za
Hi there,

I studied the mambo attack for a while!

The big problem with the source the attackers use is that one hacker can hack a site from another hacker using the same scripts!

i.e. if i successfully compromise a site and it is under my control another attacker would be able to take cont

[ more ]  [ reply ]
Looking for information on logs from Mambo or Joomla 2006-08-16
Hugo Francisco González Robledo (hugo gonzalez itslp edu mx) (1 replies)
Hi all,

I'm looking for information on the logs of Apache web server that uses
Mambo or Joomla CMS.

In recent months some attacks to those CMS's was found.

I'm researching on it trhow the apache logs, if you have Mambo or
Joomla, even if you didn't have any problem, your logs can help me a
lot.

[ more ]  [ reply ]
Re: Looking for information on logs from Mambo or Joomla 2006-08-18
Daniel Cid (danielcid yahoo com br)
Fwd: Re: Time.com: How Hizballah Hijacks the Internet 2006-08-15
Topi Ylinen (topi ylinen hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I think it would be best to keep politics off the list.
If you wish to discuss the technical and "case" aspects of this, it
is ok. But the wider political issues and implications are beyond
the scope of the list. Besides, if you bring them up on a publ

[ more ]  [ reply ]
Time.com: How Hizballah Hijacks the Internet 2006-08-12
Daniel Jimenez (dgj1menez hotmail com) (2 replies)
How Hizballah Hijacks the Internet
The group pops up on unwitting Web sites around the world in order to
communicate, recruit and fundraise
By HILARY HYLTON/AUSTIN
Posted Tuesday, Aug. 08, 2006

What do a small south Texas cable company, a suburban Virginia cable
provider and Web-hosting servers i

[ more ]  [ reply ]
Re: Time.com: How Hizballah Hijacks the Internet 2006-08-14
Mike Davis (mdavis imperfectnetworks com) (1 replies)
Re: Time.com: How Hizballah Hijacks the Internet 2006-08-14
Daniel Jimenez (dgj1menez hotmail com)
RE: Time.com: How Hizballah Hijacks the Internet 2006-08-14
AJ Rembert (ajrembert stny rr com)
www.gcn.com: VA to analyze breached data 2006-08-12
Daniel Jimenez (dgj1menez hotmail com)
08/09/06 -- 04:25 PM
VA to analyze breached data
By Mary Mosquera, GCN Staff
08/09/06 -- 04:25 PM

The Veterans Affairs Department has contracted with ID Analytics Inc. of San
Diego to provide data breach analysis to ensure that information contained
on computer equipment stolen in May from a VA e

[ more ]  [ reply ]
ComputerWorld.com: U.S. DOT laptop stolen 2006-08-12
Daniel Jimenez (dgj1menez hotmail com)
U.S. DOT laptop with personal data on 133,000 Floridians stolen
It was taken from a government vehicle parked in Doral, Fla.
Todd R. Weiss
August 10, 2006 (Computerworld)

A laptop computer with the names, addresses, birthdates and Social Security
numbers of about 133,000 Florida residents was stol

[ more ]  [ reply ]
ComputerWorld.com: Utah man charged with intercepting employer e-mail 2006-08-12
Daniel Jimenez (dgj1menez hotmail com)
Utah man charged with intercepting employer e-mail
Unauthorized reading may result in 15-year sentence
Grant Gross
August 10, 2006 (IDG News Service)

A Salt Lake City man faces up to 15 years in prison for allegedly
intercepting the e-mail of two of his former bosses, the Department of
Justice sa

[ more ]  [ reply ]
www.gcn.com: E-mail a threat to IRS network: IG 2006-08-12
Daniel Jimenez (dgj1menez hotmail com)
E-mail a threat to IRS network: IG
By Mary Mosquera, GCN Staff
08/11/06 -- 02:25 PM

The IRS is at risk for computer viruses because employees are e-mailing
chain letters, jokes, sexually oriented content and large graphic or picture
files in violation of the agency?s personal e-mail use policy.

[ more ]  [ reply ]
ComputerWorld.com: Worm fears raised after release of Windows malware 2006-08-12
Daniel Jimenez (dgj1menez hotmail com)
Worm fears raised after release of Windows malware
Bug patched in latest update, but concerns persist
Robert McMillan
August 10, 2006 (IDG News Service)

Attack code exploiting a recently-patched vulnerability in Microsoft Corp.'s
Windows operating system has been posted to the Internet, prompting

[ more ]  [ reply ]
RE: PCWorld.com: Another PC With Veterans' Data Goes Missing 2006-08-10
William Woodhams (William Woodhams wegmans com)
Yes I would also think that would be the case. I would also think that
after the first laptop went AWOL they would have called in everyone
locally and made sure that no one had data on their machines.

Bill Woodhams
Systems Technician
Development Group-Technical Systems
Wegmans Food Markets
Direc

[ more ]  [ reply ]
PCWorld.com: Another PC With Veterans' Data Goes Missing 2006-08-08
Daniel Jimenez (dgj1menez hotmail com) (1 replies)
Computer contains personal information--including social security
numbers--of about 36,000 people.
Grant Gross, IDG News Service
Tuesday, August 08, 2006 06:00 AM PDT

WASHINGTON -- A desktop PC containing the personal information of up to
36,000 U.S. military veterans has gone missing from U.S. D

[ more ]  [ reply ]
Re: PCWorld.com: Another PC With Veterans' Data Goes Missing 2006-08-09
Marios A. Spinthiras (mario netway com cy)
Re: eweek.com: Netscape.com Hacked by Digg Fans 2006-08-01
Marios A. Spinthiras (mario netway com cy)
David,

Take another case for example. This is a copy of an email sent to the
sec-focus mailing lists a while back regarding a google similar bug.

-----------------------------

Google is vulnerable to cross site scripting attacks. I found a
function built off their add RSS feed function that ret

[ more ]  [ reply ]
Re: eweek.com: Netscape.com Hacked by Digg Fans 2006-07-31
admin majorsecurity de
Hello. I have had advised that there are some Cross Site Scripting Vulnerabilities on Netscape.com homepage. I don't understand why no one from the Netscape team react to my advise and fixed the bugs....

Here's the original advisory:

http://www.securityfocus.com/archive/1/437485/30/30/threaded

[ more ]  [ reply ]
(Page 2 of 8)  < Prev  1 2 3 4 5 6 7  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus