one.point.zero

Results for tag: security

HTML email tracks you

With the ever-increasing use of HTML email, senders can embed images into their emails. These can then be loaded from a remote web server or attached directly to email. When images are remote, they can be tagged by the sender to know who, exactly, opened the message and when. Giving them, in effect, a return-receipt capability that can't be disabled by the recipient. Here's a safe demonstration of this concept. Luckily, I loathe HTML email so I have it disabled anyway.

Linked on 9th December 2000 Details

Wired News: Beware those insidious Vcards

AnotherOutlook security holehas been discovered. Those annoying Vcards (you know, the .vcf attachments no one looks at) can be used to crash or remotely control your computer.

Continue reading…

Posted on 24th February 2001 Details

Microsoft Security Bulletin (MS01-012)

Microsoft has released apatchfor the Vcard exploit in outlook.

Continue reading…

Posted on 25th February 2001 Details

Liberation: Big brother a la commission

Europe doesn’t need to worry about echelon, the NSA already has a nice and comfy seat from where it can watch everything happening within the European commission.They’re buddies with the guy in charge of communications encryption. Priceless…

Continue reading…

Posted on 2nd March 2001 Details

RSA security - Swordfish

RSA were security consultants on the newSwordfishhacker movie. Let’s hope the minimum their contribution gives us is realistic on-screen graphics and not the usual Hollywood eye candy.

Continue reading…

Posted on 3rd June 2001 Details

Wired News: Code-Breakers Go to Court

Sock it to them! Give that totalitarian RIAA what it deserves.

Continue reading…

Posted on 7th June 2001 Details

Security Focus: Code Red II spreading

My gateway is getting hit by thecode red 2 wormapproximatively every 5 minutes for the moment. It’s unbelievable, there are shitloads of people on the same cable network as me who’re infected. I can’t even reach most of them to let them know their computers have been compromised.

Continue reading…

Posted on 13th August 2001 Details

SecureMac

Just discoveredSecureMac. It’s a great security resource for mac users.

Continue reading…

Posted on 31st August 2001 Details

Handler's Diary 09/03/01

Code Red now has two ennemies:Code Green and CRclean. Both are counter-worms that spread around the net to vulnerable systems, patching the security hole that could be used by Code Red to exploit them. It sounds like something straight out ofThe Shockwave Rider.

Continue reading…

Posted on 9th September 2001 Details

Wired: Scary Hybrid Internet Worm Loose

The Code Red worm’s got abig brotherand it’s one hell of a big one. Not only does it affect sites running Microsoft’s IIS, but it can also affect any windows desktop machine simply when it accesses content on an infected server, or via Outlook (what worm doesn’t these days?). It’s already hammering away at my gateway here, and at quite a pace. This looks like it’s going to be the worst ever.  Non-windows users need not worry.

Continue reading…

Posted on 18th September 2001 Details

Microsoft Technet: Information on the 'Nimda' Worm

Microsoft has releasedinfo and patchesfor protecting yourself against the already infamous Nimda worm. Windows users, I’d go there right now if I were you.

Continue reading…

Posted on 19th September 2001 Details

ZDnet News: New CDs designed to end 'ripping'

The record industry is experimenting with anew CD copy-protection system. This one places two versions of an album on a single disc: one in standard CD form that can’t be copied (which remains to be seen) and one in protected Windows Media format for use on a computer. They’re basically helping Microsoft reinforce it’s monopoly, this is crazy. And what about people using operating systems that don’t have players for that horrible windows media format?

Continue reading…

Posted on 29th September 2001 Details

Cnet: Microsoft to hackers: Don't publish code

Microsoft to hackers and security experts: "please don’t tell people about holes in our products". Why, of course!

Continue reading…

Posted on 18th October 2001 Details

BBC News: Security hole in cash machines

It’s the turn of cash dispensers at being cracked. Researchers at Cambridge University havediscovered weaknessesin the IBM cryptoprocessors used in these machines.

Continue reading…

Posted on 9th November 2001 Details

Why The EUCD Is Bad

I hear theEUCD, Europe’s equivalent to the DMCA has been voted. Does anyone have a link?

Continue reading…

Posted on 4th December 2001 Details

Washington Post: China Finds Bugs on Jet Refitted in U.S.

The Chinese havegrounded a Boeing 767intended for the president, after numerous bugs were found aboard. It appears these bugs were planted when the jet was being refitted in the United States.

Continue reading…

Posted on 19th January 2002 Details

Sommaire du dossier sur l'affaire Tati versus Kitetoa

French siteKitetoa(yes, another horrible French website play on words: Qui t’es toi?) has been fined 1000 EUR for exposing a security hole in the website of Tati, a french retailer. This type of event seems to occur a lot in France. Remember the guy whoexposed the hole in the ATM cardsthere and was arrested?

Continue reading…

Posted on 28th February 2002 Details

ct: Body Check

German magazine c’t has put biometric access protection devices to the test and found that most of them aresurprisingly easy to fool.

Continue reading…

Posted on 8th June 2002 Details

Guardian: Now showing on satellite TV: secret American spy photos

Secret video links from American spyplanes have a serious security problem: their video signals are beingtransmitted unencrypted via satelliteand can be picked up by European TV viewers with the proper equipment as well as be viewed via the net.

Continue reading…

Posted on 13th June 2002 Details

The Observer: Panic room is a must-have for rich and famous

Real-life panic roomsare getting more popular with the well-to-be, especially since September 11th. It sounds more like a step backwards than forwards to me. Next will be people living in fully fortified buildings under their own laws with a personal army to protect them, or is that already happening?

Continue reading…

Posted on 23rd June 2002 Details

NY Post: Sour Experience

Passengers must feel safe from terrorist threats withnew security measures like these.

Continue reading…

Posted on 8th August 2002 Details

information wave technologies - news: IWT Bans RIAA From Accessing Its Network

One small step: an ISPbans the RIAAfrom accessing its network.

Continue reading…

Posted on 20th August 2002 Details

LinuxGuru: WINE: A new place for KLEZ to play

Windows worms could bepropagated by Linux boxesin very particular circumstances.

Continue reading…

Posted on 28th October 2002 Details

Wired: Record the Lens That Records You

On Christmas Eve go out shopping and take pictures of surveillance cameras forWorld Sousveillance Day.

Continue reading…

Posted on 29th November 2002 Details

iDetect Technology

It doesn’t getmore portable than thiswhen sniffing for wi-fi networks.

Continue reading…

Posted on 13th January 2003 Details

NY Times: Master Key Copying Revealed

By applying computer hacking principles, a security researcher at ATT hasrevealed a vulnerabilityin many locks that lets someone create a master key for an entire building starting with any key from that same building.

Continue reading…

Posted on 23rd January 2003 Details

Bugtraq: Exploit based on leaked code released.

The firstsecurity exploitbased on the leaked Windows source-code has been discovered. It only affects IE5 users but what’s next?

Continue reading…

Posted on 18th February 2004 Details

When ATMs Go Wrong

A Diebold brand cash machine in the States crashed and fell back into Windows XP. It didn’t take much to tempt some people into getting Windows Media player and its built-in visualiserup and running on it.

Continue reading…

Posted on 18th March 2004 Details

Microsoft Research DRM talk

Half the blogosphere is linking to this, but it’s worth adding one more to the pool: Cory Doctorow talks to Microsoft Research aboutDigital Rights Management(in annotated wiki format).

Continue reading…

Posted on 21st June 2004 Details

Cnet - Study: Unpatched PCs compromised in 20 minutes

A story on Cnet says that unpatched PCs, once connected to broadband, are compromised by “malware”within 20 minuteson average. I got a “something’s wrong with my computer” phone call 5 minutes after it being hooked up to cable once, so I’m not surprised at all.

Continue reading…

Posted on 28th August 2004 Details

Password generator bookmarklet

Here’s a fantastic littlebookmarklet for URL-specific password generationbased on a unique master password. You just need to remember one single password and the bookmarklet generates a different one for each site through MD5 (doesn’t work with IE).[via]

Continue reading…

Posted on 6th September 2004 Details

Daring Fireball: For Whatever Reasons

I’ve been havingthis exact conversationseveral times a week. The signs are certainly there, people are getting restless and uneasy with all the security failings of Windows.It will take more to provoke mass migration to another platform though, neophobia and apathy combined are doing a great job.The first step isthe browser.

Continue reading…

Posted on 28th September 2004 Details

Newday: U.S. to Enforce Rules for Mail to Canada

And I thought the US had the dumbest security measures. Mail to Canada must nowbear the complete name and address of both sender and recipient. That’s any sender, of course…

Continue reading…

Posted on 21st October 2004 Details

Postini - Email stats

Postini publishesdetailed statisticson the state of spam, viruses and harvest attacks on the net. The maps show our neighbours in Holland are quite active in the spam business while viruses are spread quite evenly across the border. It all seems to be happening up north although I’m not too sure about the accuracy of their IP to location mapping considering I’m usually identified as being in Antwerp byservices of that type.

Continue reading…

Posted on 6th November 2004 Details

Another example of RFID passports being easy to co...

Another example of RFID passports being easy to compromise.

Linked on 9th August 2008 Details

The mobib smart card used for public transport in ...

The mobib smart card used for public transport in Brussels is not as secure as they make it out to be.

Linked on 9th January 2009 Details

Mobib card not as secure as expected.

The mobib smart card used for public transport in Brussels is not as secure as they make it out to be.

Linked on 9th January 2009 Details

Fuck the cloud. Couldn’t agree more. I see lots of...

Fuck the cloud. Couldn’t agree more. I see lots of lost data in the future.

Linked on 20th January 2009 Details

Don’t Connect to a Public Wi-Fi Network Anywhere You Wouldn’t Go Barefoot

You can’t see the gross stuff on the airport floor, but you wouldn’t walk there barefoot.

Continue reading…

Posted on 29th November 2016 Details

Malicious code written into DNA infects the computer that reads it

In a mind-boggling world first, a team of biologists and security researchers have successfully infected a computer with a malicious program coded into a strand of DNA.

Continue reading…

Posted on 11th August 2017 Details

How We Just Lost the Web, What We Learned from It, and What We Need to Do Next

DRM doesn’t even work. It’s a corporate trojan horse.

Linked on 28th November 2017 Details

Tracking People Without GPS

Combining multiple freely available data sources is often just as accurate as a single one, if not more.

Linked on 17th December 2017 Details

You need an ad blocker

Ad networks, marketing services and the websites using their products regularly complain about the prevalence of ad-blocker use among their visitors. Comparing it to theft of services.

Continue reading…

Posted on 31st December 2017 Details

Now even YouTube serves ads with CPU-draining cryptocurrency miners

Yet another reason to make sure you’re running an ad blocker.

Linked on 27th January 2018 Details

Secured.fyi

Tables ranking various service providers for security and privacy: email, vpn, password management, etc.

Linked on 3rd April 2018 Details

An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

“We’re looking at a fitness tracker hacking a smart speaker, a smart speaker hacking a thermostat, and the thermostat hacking the rest of the network.”

Linked on 16th April 2018 Details

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

It’s a long one but well worth the read. Quite a story and also a warning to all those businesses pushing security work down the line.

Linked on 29th August 2018 Details

The man behind the Love Bug.

A Wired journalist tracks down the author of the infamous Love Bug trojan that brought down millions of computers 20 years ago and made the news worldwide.

Linked on 1st October 2020 Details

The old "I've go nothing to hide" argument.

Note: playing video here allows YouTube to track you across sites. View directly on YouTube to avoid this.

Another video concerning online tracking and all the data about you constantly being hoovered up. This one takes a good look at the difference between privacy and security.

Added on Aug 7, 2022 Details