Wonder if this is real 2

Posted by Ozi
Ozi
Ozi has not set their biography yet
User is currently offline
on Wednesday, 12 September 2007
in Digital Blogs
Swedish security researcher Dan Egerstad has revealed how he collected 100 passwords from embassies and governments worldwide, without hacking into anything: he sniffed Tor exit routers. Both Ars and heise have writeups on Egerstad's blog post, but neither adds much to the original. It's not news that unencrypted traffic exits the Tor network unencrypted, but Egerstad correctly perceived, and called attention to.
Tags: Untagged

Wonder if this is real

Posted by Ozi
Ozi
Ozi has not set their biography yet
User is currently offline
on Thursday, 06 September 2007
in Digital Blogs
Story i found on yahoo news:

Taking a dig at cyber security preparedness levels, a hacker, who claims to be based in Sweden, posted online this evening the passwords of 100 email accounts of embassies and government offices across the world, including 13 Indian accounts, containing classified information and correspondence.

Top on the list of passwords that have been posted on http://derangedsecurity.com give access to email accounts of Indian Ambassadors to China, US, Sweden, Germany, Italy, Oman, Finland besides officials of the National Defence Academy (NDA) and Defence Research and Development Organisation (DRDO).

Other accounts include those of the embassies of Uzbekistan, Iran, Afghanistan, Pakistan, Japan, China, UK and Russia
Tags: Untagged

Top ten Internet Crimes

Posted by Ozi
Ozi
Ozi has not set their biography yet
User is currently offline
on Thursday, 19 April 2007
in Digital Blogs
"The Bad Guys blog at USNews.com offers a look at the top ten Internet crimes of 2006. The federal study cited draws on over 200,000 complaints to US law enforcement and regulatory agencies."
Tags: Untagged

Linux flaw

Posted by Ozi
Ozi
Ozi has not set their biography yet
User is currently offline
on Monday, 16 April 2007
in Digital Blogs
"A flaw has been found in a major Linux Wi-Fi driver that can allow an attacker to run malicious code and take control of a laptop, even when it is not on a Wi-Fi network."
Tags: Untagged