Similar Posts
Volcanoes and disaster recovery
Dr. Johannes Ullrich at SANS brought up a good point in his morning podcast (Stormcast 296 ) about widespread transportation shutdowns and disaster recovery planning. The Eyjafjallajokull glacier volcano in Iceland, which has stopped all air travel in the UK, Western Europe and Scandinavia, of course is the case in point. Those writing and updating…
Google announces open app store for ‘Installable Web apps’
Google has announced the upcoming availability of the Chrome Web Store, an open marketplace similar to the Android Market or iTunes App Store that deals exclusively in Web Apps. This store doesn’t exist yet, but will open both to developers and to users “later this year.” The store will deal in the “installable Web apps,”…
Password leak at meetOne
h-online: A data leak at the meetOne dating site allowed anyone to access private data including the plaintext passwords, email addresses and real names of the site’s approximately 900,000 members. To obtain the data, an attacker simply needed to increment a URL parameter. After they were informed by The H‘s associates at heise Security, the…
Exploit Code for IE 0-day vulnerability
Exploit code for the the zero-day vulnerability in Internet Explorer has been added to the Metasploit framework. According to an email HD Moore wrote to ZDNet’s Ryan Naraine, the exploit works quite reliable – successful 50% of the times on Windows XP with SP2 and SP3 with IE7 and deactivated Data Execution Prevention (DEP). The…
Mentorship in Tech: How to Be an Effective Mentor and Mentee
Mentorship is a cornerstone of professional growth and development, particularly in the fast-paced and ever-evolving tech industry. Whether you’re a seasoned professional or just starting your career, engaging in a mentor-mentee relationship can provide invaluable insights, support, and opportunities for both personal and professional advancement. This blog post explores the benefits of mentorship in tech…
Avira know better what to put and where
Sometimes we encounter childish messages from the authors in the body of malware. A variant of the TDSS family we got recently is even going a step further by offering a convenient location for a malware signature. The samples include the message “Put your signature here”, which is shown when run inside a debugger. While…