Payment with credit or debit cards, at least in Serbia, at some of Intesa bank owned POS terminals is NOT secure. They print full credit card number on paper slip.
To simply check if you are infected, you can use Conficker Eye Chart developed by Conficker Working Group.
Not many people seem to have noticed that Invisiblethings team has reported the 3rd attack against SMM (Attacking SMM Memory via Intel® CPU Cache Poisoning) which they have found in the last 10 months. Joanna Rutkowska, founder and CEO of … Continued
Read this interview and you probably will be scared. It is interview with Matt Knox. He talks about his early days designing and writing adware for Direct Revenue.
I have worked for some time on using of artificial intelligence (AI) for protecting computer / information systems and networks. My work is primarily in area of intrusion prevention and detection systems (IDS and IPS). There is approach which considers machine intelligence usage for attack on systems’ security.
It seems that bad days came for MD5 and those who based hashes on it. It is possible to create two executable programs with different functionalities with identical MD5 hash. Therefore, it is possible to create malicious executable which has … Continued
Do you owe cell phone? Yes, of course. Then read this: Cell Phone Spying: Is Your Life Being Monitored? It says: It connects you to the world, but your cell phone could also be giving anyone from your boss to … Continued
Poll “Primary motives for hacking are” which was open on this blog since December 21, 2007 to March 31, 2008 is closed now. Based on answers of visitors, who took opportunity to vote in the poll, main reason why hackers … Continued
If you’ve thought your data are secure on encrypted hard disk, read: Lest We Remember: Cold Boot Attacks on Encryption Keys. Researchers with Princeton University and the Electronic Frontier Foundation (EFF) have found a flaw that renders disk encryption systems useless if … Continued
Be careful, be very careful when use social networking sites! Some social networking sites and some sites that pretend to be social networking, but are marketing profiling sites, may pose huge privacy risk. I will talk here about very popular … Continued