Browsing articles in "Blog"

How to Boot From a USB Drive in VirtualBox

Apr 27, 2014   //   by Crocmaster   //   Geek Speaks  //  No Comments


VirtualBox can boot virtual machines from USB flash drives, allowing you to boot a live Linux system or install an operating system from a bootable USB device. This option is well-hidden.

As this option isn’t exposed in the interface and requires some digging, it may not always work perfectly. It worked fine with Ubuntu 14.04 on a Windows host, but don’t be surprised if you encounter problems with some configurations.  Read more >>

What the Heartbleed Bug Is and Why You Need to Change Your Passwords Now

Apr 12, 2014   //   by Crocmaster   //   Web Threats  //  No Comments

The last time we alerted you to a major security breach was when Adobe’s password database was compromised, putting millions of users (especially those with weak and frequently reused passwords) at risk. Today we’re warning you about a much bigger security problem, the Heartbleed Bug, that has potentially compromised a staggering 2/3rds of the secure websites on the internet. You need to change your passwords, and you need to start doing it now.  Read more >>

Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style

Apr 9, 2014   //   by Crocmaster   //   Web Threats  //  No Comments

OpenSSL defect still exposing sensitive data even after patch is released.

Lest readers think “catastrophic” is too exaggerated a description for the critical defect affecting an estimated two-thirds of the Internet’s Web servers, consider this: at the moment this article was being prepared, the so-called Heartbleed bug was exposing end-user passwords, the contents of confidential e-mails, and other sensitive data belonging to Yahoo Mail and almost certainly countless other services.  Read more >>

Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping

Apr 9, 2014   //   by Crocmaster   //   Information Security  //  No Comments

Exploits allow attackers to obtain private keys used to decrypt sensitive data.

For a more detailed analysis of this catastrophic bug, see this update, which went live about a few minutes after HackShark published this initial post.

Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data.  Read more >>

How a website flaw turned 22,000 visitors into a botnet of DDoS zombies

Apr 9, 2014   //   by Crocmaster   //   Web Threats  //  No Comments

Everyday browsers are unwittingly conscripted into powerful attack platform.


Researchers have uncovered a recent denial-of-service attack that employed an unusual, if not unprecedented, technique to surreptitiously cause thousands of everyday Internet users to bombard the target with a massive amount of junk traffic.

The attack worked by exploiting a Web application vulnerability on one of the biggest and most popular video sites on the Web, according to a blog post published recently by researchers at security firm Incapsula, which declined to identify the site by name. Malicious JavaScript embedded inside the image icons of accounts created by the attackers caused anyone viewing the users’ posts to run attack code that instructed their browser to send one Web request per second to the DoS victim. In all, the technique caused 22,000 ordinary Web users to unwittingly flood the target with 20 million GET requestsRead more >>



Protected by Copyscape Online Copyright Protection

Latest Visitor Record

DO NOT try to do anything wrong with our website so that we may have to report to the Feds!