Kaminsky To Release ‘Phreebird’ For Easy DNSSEC
http://ba.darkreading.com/authentication/167901072/security/application-security/228200646/index.html
Stuxnet has a double payload
http://www.h-online.com/security/news/item/Stuxnet-has-a-double-payload-1137521.html
GPUs crack passwords in the cloud
http://stacksmashing.net/2010/11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances/
Super-secret debug capabilities of AMD processors
http://www.woodmann.com/collaborative/knowledge/index.php/Super-secret_debug_capabilities_of_AMD_processors_!
http://www.eweekeurope.co.uk/news/amd-denies-cpu-debugger-was-a-secret-13759
McAfee Threats Report - Third Quarter 2010
http://www.mcafee.com/us/local_content/reports/q32010_threats_report_en.pdf
The enemy in the network card
http://esec-lab.sogeti.com/dotclear/index.php?post%2F2010%2F11%2F21%2FPresentation-at-Hack.lu-%3A-Reversing-the-Broacom-NetExtreme-s-firmware
Slow CPU equals malware defense…?
http://www.f-secure.com/weblog/archives/00002067.html
European ATM skimmer attacks on the rise
http://krebsonsecurity.com/2010/11/crooks-rock-audio-based-atm-skimmers/
Secure Java programming with Fabric
http://www.cs.cornell.edu/projects/fabric/
http://www.cs.cornell.edu/andru/papers/fabric-sosp09.pdf
http://www.news.cornell.edu/stories/Sept10/Fabric.html
Chrome to run Flash Player in a sandbox
http://blog.chromium.org/2010/12/rolling-out-sandbox-for-adobe-flash.html
Escaping IE Protected Mode
http://www.verizonbusiness.com/resources/whitepapers/wp_escapingmicrosoftprotectedmodeinternetexplorer_en_xg.pdf
An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications
http://cseweb.ucsd.edu/~d1jang/papers/ccs10.pdf
IE9 and Privacy: Introducing Tracking Protection
http://blogs.msdn.com/b/ie/archive/2010/12/07/ie9-and-privacy-introducing-tracking-protection-v8.aspx
Pretty interesting information.
Thanks Asyn.
Support for WebSockets in Firefox 4 disabled (for now)
http://www.0xdeadbeef.com/weblog/2010/12/disabling-websockets-for-firefox-4/
https://bugzilla.mozilla.org/show_bug.cgi?id=616733
http://www.ietf.org/mail-archive/web/hybi/current/msg04744.html
Asyn,
What’s the difference between what you’re posting in here and what’s being posted in the
Security Warnings threat ???
http://forum.avast.com/index.php?topic=52252.0
Hi Bob…!
Well, the difference is that I don’t post any security warnings here.
Have a nice day,
asyn
NIST’s search for the super hash – just five candidates left in SHA-3 final
http://www.h-online.com/security/news/item/NIST-s-search-for-the-super-hash-just-five-candidates-left-in-SHA-3-final-1151325.html
Operation Payback: protests via mouse click
http://www.h-online.com/security/news/item/Operation-Payback-protests-via-mouse-click-1150790.html
Brief Analysis of the Gawker Password Dump
http://www.duosecurity.com/blog/entry/brief_analysis_of_the_gawker_password_dump