CGISecurity Logo
  • German sites close, as anti-hacking law arrives

    "Security researchers in Germany continued to pull down exploit code from their sites last week, scrambling to comply with a German law that makes illegal the distribution of software that could be used to break into computers. The German law — referred to as 202(c) — went into effect on Sunday. Many experts have complained…

  • eEye Gets Gets Into Web Application Security Space

    "Marc Maiffret, CTO and chief hacking officer at eEye, said in an interview today that the company would be entering the Web app security space "soon." "It's a natural progression for us to add Web app scanning," says Maiffret, who wouldn't divulge details of the new offering." "You can scan for missing patches and vulnerabilities,…

  • Undercover reporter ousted at defcon, probably pretty f@!ked

    UPDATE: Her myspace page was linked off of defconpics.org and shortly after has been removed from myspace. No word on how it was removed at this time. An NBC reporter (Michelle Madigan Associate Producer of NBC Dateline) was found to be trying to find hackers for hire and recording them with a video camera. Jeff…

  • US Denies Halvar Flake from presenting at blackhat

    "I've been denied entry to the US essentially for carrying my trainings material. Wow. It appears I can't attend Blackhat this year. I was denied entry to the US for carrying trainings materials for the Blackhat trainings, and intending to hold these trainings as a private citizen instead of as a company. After a 9-hour…

  • Google Home-brews Powerful Automatic Scanning Fuzzer

    "Google's security team is home-brewing a powerful combination scanner and fuzzing tool that experts say will be unique outside of the commercial domain. In a posting on the Google security team's blog, Srinath Anantharaju said on July 16 that the security team has been working on a black-box fuzzing tool called Lemon, in the spirit…

  • Zero-day sales not “fair” — to researchers

    " Two years ago, Charles Miller found a remotely exploitable flaw in a common component of the Linux operating system, and as many enterprising vulnerability researchers are doing today, he decided to sell the information. “ I don't think it fair that researchers don't have the information and contacts they need to sell their research.…

  • Hacking Capitalism: electronic financial trading

    "You'd think electronic financial trading would be extra secure, but not so much: One of the most popular application-layer protocols in the financial industry leaves these money applications wide open to attack, according to researchers. The application-layer FIX (financial information exchange) protocol is used by financial services firms, stock exchanges, and investment banks for automated…

  • Hacker Defaces Microsoft U.K. Web Page

    "A hacker managed a rare feat Wednesday, successfully attacking a Web page within Microsoft’s U.K. domain and replacing the page with several graphics related to Saudi Arabia. The hacked page was a U.K. events page here. It has since been fixed. According to the security site Zone-h, a SQL injection attack is the likely culprit.…

  • Is Web 2.0 Safe?

    I went to http://www.msn.com today and saw an article called ‘is Web 2.0 Safe?’. To my surprise it linked to an article where Jeremiah Grossman and Robert Hansen were quoted. The fact that MSN is linking to web security related articles really speaks to the change of the industry. "As users store more data online,…

  • Microsoft Security Grunt voted #6 on Worst Jobs in Science 2007 by Popular Science

    Popular Science has voted ‘Microsoft Security Grunt’ as the 6th worst job in science to have. "Do you flinch when your inbox dings? The people manning secure@microsoft .com receive approximately 100,000 dings a year, each one a message that something in the Microsoft empire may have gone terribly wrong. Teams of Microsoft Security Response Center…

  • Quicken Backdoor Discovered

    "A Russian firm that provides password-recovery services says it has found a backdoor in the encryption mechanism that Quicken uses to secure password-protected files, a feature that makes millions of users of the personal finance program more vulnerable to government spooks or other highly determined snoops. Elcomsoft, which made waves in 2001 after it circulated…

  • Department of Homeland Security gets Pwned, and pwned, and pwned

    "The Homeland Security Department, the lead U.S. agency for fighting cyber threats, suffered more than 800 hacker break-ins, virus outbreaks and other computer security problems over two years, senior officials acknowledged to Congress. In one instance, hacker tools for stealing passwords and other files were found on two internal Homeland Security computer systems. The agency’s…

  • Gangs infect 10,000 websites to steal users’ bank details

    "Hackers have launched an assault on websites in Italy and around the world dubbed the Italian Job in a move seen by internet security experts as the next step in the escalating problem of cyber crime. Gangs presumed to be based in eastern Europe have probably infected more than 10,000 web pages on popular websites…

  • New security breach revealed: Los Alamos National Labs

    "Reports of a major breach of security involving the board of directors of the corporation managing Los Alamos National Laboratory came to light Thursday. The chairman of the House Energy and Commerce Committee that oversees the nuclear complex wrote to Energy Secretary Samuel Bodman citing information obtained by committee staff from sources outside the department.…

  • Cenzic Patents the obvious: Fault Injection!

    I monitor google news for anything application security related and found the following announced today by Cenzic. "the U.S. Patent and Trademark Office (PTO) has issued the company U.S. Patent No. 7,185,232, focused on fault injection technology, which is commonly used by most security assessment scanners." – Cenzic Cenzic is not the first application security…

  • Image attack on MySpace boosts phishing exposure

    "The number of page views garnered by fraudulent sites climbed by a factor of five in March and April, fueled by a phishing scheme targeting MySpace users, stated a Google analysis published on Monday. The attack used a modification to the style sheet of a user’s profile to place a transparent image over the page,…

  • Laws Threaten Security Researchers

    "What if a Web researcher found a bug on your Website today — but was too afraid of the law to tell you? The Computer Security Institute (CSI) recently formed a working group of Web researchers, computer crime law experts, and U.S. Department of Justice agents to explore the effects of laws that might hinder…

  • Phrack is back!

    Phrack is finally back! * Hijacking RDS TMC traffic information signal * Attacking the Core: Kernel Exploitation Notes * The revolution will be on YouTube * Automated vulnerability auditing in machine code * The use of set_head to defeat the wilderness * Cryptanalysis of DPA-128 * Mac OS X Wars – A XNU Hope *…

  • Widescale Unicode Encoding Implementation Flaw Discovered

    Amit Klein was kind enough to point out that the ASP.NET filter evasion issue is actually a known issue. It was first pointed out in 2004! According to that post "We have decided that a KB article and update to tools and/or best practice guidelines should be done for this, and will be as time…

  • Should vendors close all security holes?

    "Vendors should close all known security holes, whether publicly discussed or not. The idea behind this is that any existing security vulnerability should be closed to strengthen the product and protect consumers. Sounds great, right?" "The reader wrote to say that his company often sits on security bugs until they are publicly announced or until…

  • One in 10 web pages laced with malware – Google

    "At least one in 10 web pages are booby-trapped with malware, according to Google. A five-strong Google research team found that 450,000 pages, out of a sample of 4.5 million pages, contained scripts to install malicious code, such as Trojans and spyware on vulnerable PCs, the BBC reports. This is a conservative estimate – another…

  • Scaling back Web browser security expectations

    " When Web browsers first emerged as front-end interfaces to Web-based applications, it was in an era where application-layer attacks were few and far between. Today, the browser has become one of the most critical and most used pieces of software on everyone’s computer. Consequently, it has become the focus of attack. Despite the best…

  • Javascript is everywhere

    DSHIELD has a published a writup about some of the places that JavaScript can exist called Javascript hiding everywhere. Some of those places include – Quicktime – Flash – PDF Files – MP3’s "Frequent readers will know that we often recommend to ease up on allowing scripting as it’s used by the bad guys. XSS…

  • Security’s Symbiosis

    "In a recent paper titled "Teaching an Old Dog New Tricks," security guru Marcus Ranum argues that independent "security researchers" who spend their time constantly looking for security bugs are a drain on the security community. He even has a name for these people: vulnerability pimps. He thinks that if these people were really serious…

  • WordPress website compromised, wordpress backdoored

    The WordPress development team has  posted an announcement that the download server had been hacked, and wordpress 2.1.1 had a backdoor included in it allowing for remote code execution. "This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared…