Technical

Kaminsky To Release ‘Phreebird’ For Easy DNSSEC
http://ba.darkreading.com/authentication/167901072/security/application-security/228200646/index.html

Stuxnet has a double payload
http://www.h-online.com/security/news/item/Stuxnet-has-a-double-payload-1137521.html

GPUs crack passwords in the cloud
http://stacksmashing.net/2010/11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances/

Super-secret debug capabilities of AMD processors
http://www.woodmann.com/collaborative/knowledge/index.php/Super-secret_debug_capabilities_of_AMD_processors_!
http://www.eweekeurope.co.uk/news/amd-denies-cpu-debugger-was-a-secret-13759

McAfee Threats Report - Third Quarter 2010
http://www.mcafee.com/us/local_content/reports/q32010_threats_report_en.pdf

The enemy in the network card
http://esec-lab.sogeti.com/dotclear/index.php?post%2F2010%2F11%2F21%2FPresentation-at-Hack.lu-%3A-Reversing-the-Broacom-NetExtreme-s-firmware

Slow CPU equals malware defense…?
http://www.f-secure.com/weblog/archives/00002067.html

European ATM skimmer attacks on the rise
http://krebsonsecurity.com/2010/11/crooks-rock-audio-based-atm-skimmers/

Secure Java programming with Fabric
http://www.cs.cornell.edu/projects/fabric/
http://www.cs.cornell.edu/andru/papers/fabric-sosp09.pdf
http://www.news.cornell.edu/stories/Sept10/Fabric.html

Chrome to run Flash Player in a sandbox
http://blog.chromium.org/2010/12/rolling-out-sandbox-for-adobe-flash.html

Escaping IE Protected Mode
http://www.verizonbusiness.com/resources/whitepapers/wp_escapingmicrosoftprotectedmodeinternetexplorer_en_xg.pdf

An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications
http://cseweb.ucsd.edu/~d1jang/papers/ccs10.pdf

IE9 and Privacy: Introducing Tracking Protection
http://blogs.msdn.com/b/ie/archive/2010/12/07/ie9-and-privacy-introducing-tracking-protection-v8.aspx

Pretty interesting information.

Thanks Asyn.

Support for WebSockets in Firefox 4 disabled (for now)
http://www.0xdeadbeef.com/weblog/2010/12/disabling-websockets-for-firefox-4/
https://bugzilla.mozilla.org/show_bug.cgi?id=616733
http://www.ietf.org/mail-archive/web/hybi/current/msg04744.html

Asyn,
What’s the difference between what you’re posting in here and what’s being posted in the
Security Warnings threat ???
http://forum.avast.com/index.php?topic=52252.0

Hi Bob…!
Well, the difference is that I don’t post any security warnings here.
Have a nice day,
asyn

NIST’s search for the super hash – just five candidates left in SHA-3 final
http://www.h-online.com/security/news/item/NIST-s-search-for-the-super-hash-just-five-candidates-left-in-SHA-3-final-1151325.html

Operation Payback: protests via mouse click
http://www.h-online.com/security/news/item/Operation-Payback-protests-via-mouse-click-1150790.html

Brief Analysis of the Gawker Password Dump
http://www.duosecurity.com/blog/entry/brief_analysis_of_the_gawker_password_dump