Nikto is an advanced web vulnerability scanner, which can help you expose the potential holes in your webserver (and thus allow you to fix them before malicious users attempt to exploit them). This guide will show you how to use its advanced scanning features to expose holes in your webserver which you never knew existed!
Your computer running Linux somehow ran into a hardware glitch and had to be hauled to the neighborhood Computer service center. And you are asked to leave the machine at the service center and come back after a couple of days so that the technician can have a good look at it. But you are a bit worried because the harddisk contains the blue prints of the most secret project you are currently working on.
OpenOffice.org has hit back at claims that the alternative office applications suite is riddled with security holes. Researchers at the French Ministry of Defense say that OpenOffice is subject to security weaknesses that make it at least as susceptible to computer viruses as the commercial, more widely used, Microsoft Office.
With Microsoft's Office suite now being targeted by hackers, researchers at the French Ministry of Defence say users of the OpenOffice.org software may be at even greater risk from computer viruses.
“The idea behind Blue Pill is simple,” says Joanna Rutkowska of invisible things. “Your operating system swallows the Blue Pill and it awakes inside the Matrix.”
One core Debian server has been reinstalled after a compromise and services have been restored. On July 12th the host gluck.debian.org has been compromised using a local root vulnerability in the Linux kernel. The intruder had access to the server using a compromised developer account.
"Early this morning we discovered that someone had managed to compromise gluck.debian.org," Debian developer James Troup wrote in an e-mail to the Debian community shortly before 4am AEST.
The FBI has drafted sweeping legislation that would require Internet service providers to create wiretapping hubs for police surveillance and force makers of networking gear to build in backdoors for eavesdropping.
A security researcher has promised to release one browser vulnerability each day for the next month as part of his self-proclaimed "Month of Browser Bugs."
Potentially serious security flaws have been found in existing versions of the Mambo and Joomla content management systems, and developers of the two projects are advising users to install upgrades or security patches as soon as possible.
A French-based Englishman, John Graham-Cumming, is about 666,666 clicks away from creating a weapon to kill spam for good.
A free Web browser that bills itself as a tool for privacy protection is, in fact, a click-fraud engine for pornographic Web sites, security vendor Panda Software warned Friday.
A mass e-mail sent out last week by open-source database vendor MySQL erroneously contained the e-mail addresses of about 9,300 customers instead of information on a series of software-support special offers that the company meant to publicize.
KDE made two security announcements today, the KDM Symlink Vulnerability is a potential local exploit on systems using KDM as their login manager. Artswrapper return value checking vulnerability affects Linux 2.6 systems that have artswrapper installed SUID root.
Linux is insecure. Open source is insecure. Windows is insecure. All software is insecure.
Deal with it.
OpenOffice.org responded Friday to claims in the media that the first virus had been discovered for the open source productivity suite. The group said that macro viruses are possible in any program that supports the feature.