Suck-O Time

Support us

Donate using PayPal

Amount:  

Your nickname:

Cry About Crypt

Our free, private and encrypted file- and media-sharing service!

Cry About Crypt

Latest posts

Our forums contain more than 72.000 posts in more than 10.00 topics at the moment.

Feel free to register for an account here.
Anti-piracy enforcement vs. a functional Internet PDF Print E-mail
Written by ilkjester   
Thursday, 30 September 2010 08:52

September 28, 2010 |  7:13 pm | by John Healey | Source: LA Times

The Times' Richard Verrier offered a compelling piece today about online piracy's effect on indie filmmakers, noting how Greg Carter's "A Gangland Love Story" (an updated take on "Romeo and Juliet" with rival black and Latino gangs) had found its way onto at least 60 bootlegged-movie websites. We can quibble about Carter's estimate of the monetary damage -- he says he's lost $100,000 in revenue -- but there's no defense for the sites and uploaders who've made Carter's work available for free.

Many of the movie bootleggers are overseas, often in countries with no interest in enforcing U.S. copyrights. Their only points of contact with the U.S. may be with the companies that register their dot-coms or dot-net domain names and the Internet service providers that connect them to customers here.

Last Updated on Thursday, 30 September 2010 14:34
 
Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes? PDF Print E-mail
Written by bad_brain   
Friday, 24 September 2010 19:08

A top expert in protecting industry and infrastructure from cyber-attacks has told the Financial Times that a computer worm which surfaced more than a year ago may well have been a deliberate attempt by the U.S. government to destroy Iran's primary nuclear facility.

 

 

The Stuxnet worm has been researched for months, but its design is so complex that security experts are still unable to say definitively who or what it was created to attack.

The worm exploits gaps in Windows operating systems (which Microsoft has since patched) to attack very specific Siemens software used to operate industrial machinery, reports the FT.

Last Updated on Friday, 24 September 2010 19:22
 
Binary Planting PDF Print E-mail
Written by dnr   
Saturday, 11 September 2010 18:43
Yesterday, Apple issued new versions of the Safari browser that fix a binary planting vulnerability our company has reported to them in March this year under our then-effective disclosure policy. (See Apple's advisory.)

In the last 20 days since the binary planting monster escaped to the wilderness, eager bug-hunters were focused on unsafe loading of libraries, and understandably so: free tools were made available, and instructions were published on how to use monitoring software like Sysinternals\' Process Monitor for detecting unsafe library loadings. As it turned out, tools + instructions + 20 days = 117 remotely exploitable vulnerabilities (at the time of this writing). The list is growing and will likely surpass our own list of 396 DLL planting and 127 EXE planting vulnerabilities at some time.
Last Updated on Saturday, 11 September 2010 18:38
 
General says cyber attacks must be stopped PDF Print E-mail
Written by hpprinter100   
Friday, 20 August 2010 17:58

Former NATO commander General Wesley Clark has confirmed a "growing number" of severe cyber attacks against US government and commercial installations.
According to Clark, the US currently possesses both the technology and "means" to stop the unrelenting cyber offensive.
General says cyber attacks must be stopped"The job now is to deploy these assets as soon as possible," Clark told an audience of security specialists at the National Press Club.

Last Updated on Wednesday, 25 August 2010 00:02
 
RFID of automobiles, tire pressure sensor PDF Print E-mail
Written by dnr   
Sunday, 15 August 2010 15:32

The pressure sensors contain unique IDs, so merely eavesdropping enabled the researchers to identify and track vehicles remotely. Earlier in the year, researchers from the University of Washington and University of California San Diego showed that the ECUs could be hacked, giving attackers the ability to be both annoying, by enabling wipers or honking the horn, and dangerous, by disabling the brakes or jamming the accelerator. The Rutgers and South Carolina research will be presented at the USENIX Security conference later this week.

Last Updated on Monday, 16 August 2010 10:35
 
«   Start  Prev  21  22  23  24  25  26  27  28  29  30  Next  End »

Page 30 of 40