tag:blogger.com,1999:blog-8822179874632819562024-03-05T03:41:50.692-05:00Wyretap.netWyretap Network ©2001 - 2010Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.comBlogger188125tag:blogger.com,1999:blog-882217987463281956.post-43328084344040487572012-10-30T01:27:00.001-04:002012-10-30T01:27:14.772-04:00The New Social Security How Social Media is Changing the Cyber Security Landscape<a href="http://feedproxy.google.com/~r/SecuritynewsportalcomSecurityBlogs/~3/8zD8WriyWzE/article.php">The New Social Security How Social Media is Changing the Cyber Security Landscape</a>: The New Social Security How Social Media is Changing the Cyber Security Landscape<img height="1" src="http://feeds.feedburner.com/~r/SecuritynewsportalcomSecurityBlogs/~4/8zD8WriyWzE" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com1tag:blogger.com,1999:blog-882217987463281956.post-18951205438117415022012-10-30T01:22:00.001-04:002012-10-30T01:22:08.692-04:00Windows kernel vulnerability adds to Microsoft’s woes<a href="http://nakedsecurity.sophos.com/2010/01/21/windows-kernel-vulnerability">Windows kernel vulnerability adds to Microsoft’s woes</a>: Microsoft are under the pump fighting vulnerabilities at the moment. Just six-and-half hours after blogging that the Operation Aurora Internet Explorer fix would be ready the next day, they blogged about a publicly-announced Windows kernel vulnerability. Microsoft’s 979682 advisory about the vulnerability is sadly devoid of any useful (or even interesting) technical details at the [...]Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-17298789128163075072012-10-30T01:21:00.005-04:002012-10-30T01:21:43.178-04:00Beware! DHL Express malware attack appearing in inboxes<a href="http://nakedsecurity.sophos.com/2012/10/15/dhl-express-malware">Beware! DHL Express malware attack appearing in inboxes</a>: SophosLabs has intercepted a widespread malware campaign that has been spammed out, disguised as a communication from DHL Express.Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-70568702360516408012012-10-30T01:21:00.003-04:002012-10-30T01:21:30.158-04:00Scammers adopt new eBay logo in short order<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/5AyczJ0uFTE/">Scammers adopt new eBay logo in short order</a>: A slimmer, trimmer new eBay logo, rolled out last week, is already being pasted into phishing scams. Add "skinny letters" to the list of warning signs that flag fake eBay-branded come-ons. <br />
<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=197267&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/5AyczJ0uFTE" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-23093705941977159142012-10-30T01:21:00.001-04:002012-10-30T01:21:17.078-04:00Hackers hit small US town, steal tax payer data and $400,000<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/u71PU4GKnGs/">Hackers hit small US town, steal tax payer data and $400,000</a>: The town of Burlington, Washington has warned residents that they could be the targets of identity theft, after hackers compromised systems used to run an online automatic utility billing system and emptied $400,000 from a city bank account. <br />
<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=197302&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/u71PU4GKnGs" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-86211991542215183522012-10-30T01:20:00.001-04:002012-10-30T01:20:15.908-04:00Hackers hit small US town, steal tax payer data and $400,000<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/u71PU4GKnGs/">Hackers hit small US town, steal tax payer data and $400,000</a>: The town of Burlington, Washington has warned residents that they could be the targets of identity theft, after hackers compromised systems used to run an online automatic utility billing system and emptied $400,000 from a city bank account. <br />
<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=197302&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/u71PU4GKnGs" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-68803244160095746482012-10-30T01:13:00.003-04:002012-10-30T01:13:23.527-04:00NASA hacker Gary McKinnon loses appeal against US extradition<a href="http://nakedsecurity.sophos.com/2008/07/30/nasa-hacker-gary-mckinnon-loses-appeal-against-us-extradition">NASA hacker Gary McKinnon loses appeal against US extradition</a>: Gary McKinnon has lost his appeal at the House of Lords against being extradited to the United States. It seems obvious that the USA’s position is clear. Anyone making any attempts to compromise American government and military computers and data, will face the consequences – in McKinnon’s case, this means they’re not going to give [...]Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-77514735786598866692012-10-30T01:13:00.001-04:002012-10-30T01:13:03.813-04:00HSBC recovers from DDoS attack, after internet banking services disrupted<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/JSa1jDpure8/">HSBC recovers from DDoS attack, after internet banking services disrupted</a>: HSBC has successfully recovered from a distributed denial-of-service (DDoS) attack which saw a number of its websites brought down, making it impossible for customers to use internet banking services.<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=198183&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/JSa1jDpure8" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-51858488362751529982012-10-30T01:12:00.005-04:002012-10-30T01:12:49.874-04:0042% of lost mobiles have no security in place to protect data, says report<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/WDiAfixDT3I/">42% of lost mobiles have no security in place to protect data, says report</a>: Out of those who reported that they had lost devices, 42% had no security measures in place, and one in five contained access to work-related documents or email. Young, male Londoners, you're the worst when it comes to losing stuff, but take heart: you're the best at making sure your lost gadgets are secured. <br />
<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=198023&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/WDiAfixDT3I" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-10509447285418082082012-10-30T01:12:00.003-04:002012-10-30T01:12:34.937-04:00Firefox 17 protects your privacy while enhancing the Facebook experience<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/MoGzJY08m84/">Firefox 17 protects your privacy while enhancing the Facebook experience</a>: The latest beta release of Mozilla's popular Firefox browser has introduced a new social media API. Can a web browser make it easier to use social media while protecing your privacy? Mozilla hopes so. <img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=198885&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/MoGzJY08m84" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-1726877706529024982012-10-30T01:12:00.001-04:002012-10-30T01:12:09.954-04:00Offensive Facebook email leads to Blackhole malware attack<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/2zHcSSEUPN0/">Offensive Facebook email leads to Blackhole malware attack</a>: Facebook users are warned to be on their guard against unsolicited emails they might receive suggesting that someone has left an offensive comment about them on their wall.<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199047&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/2zHcSSEUPN0" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-17317237355464614352012-10-30T01:11:00.005-04:002012-10-30T01:11:59.356-04:00Sony PS3 hacked "for good" - master keys revealed<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/QCut9UknOj8/">Sony PS3 hacked "for good" - master keys revealed</a>: Sony's PS3 has been hacked. This time, it looks as though it's been hacked for good.<br />
<br />
We explain why this is different from previous hacks, and treat you to the war of words between the original hackers and the pirates who stole their work...<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199139&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/QCut9UknOj8" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-11672140318121127562012-10-30T01:11:00.003-04:002012-10-30T01:11:40.551-04:00IP theft attacks can hide on networks for years, unspotted by corporate victims, report claims<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/TNg90tyn768/">IP theft attacks can hide on networks for years, unspotted by corporate victims, report claims</a>: Organizations in the financial services and public administration sectors are the primary targets of sophisticated attacks aimed at stealing intellectual property, with attacks involving both external and internal agents and lasting for months or years, according to a new report from Verizon.<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199202&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/TNg90tyn768" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-47476518935431680142012-10-30T01:11:00.001-04:002012-10-30T01:11:18.270-04:00Duck talks security on Risky Business<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/o_VmN_2_snI/">Duck talks security on Risky Business</a>: Naked Security's Paul Ducklin talks to the Risky Business podcast about Oracle's patching schedule, lawsuits against Sony after the PlayStation Network breach and how a mathematician unpicked Google's DKIM verifier.<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199416&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/o_VmN_2_snI" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-77291171591662191702012-10-30T01:10:00.005-04:002012-10-30T01:10:40.829-04:00Blackhole malware attack spread via 'Your photos' email<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/wTC9FWWD-N0/">Blackhole malware attack spread via 'Your photos' email</a>: A malware attack has been spammed out widely via email to internet users, posing as a message about photos.<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199494&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/wTC9FWWD-N0" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-50363282097413185322012-10-30T01:10:00.003-04:002012-10-30T01:10:26.138-04:00US EMP missile fries PCs and electronics in trial run of microwave weapon<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/xiNXTbLNN7M/">US EMP missile fries PCs and electronics in trial run of microwave weapon</a>: Sci-fi turns real as the Boeing and the US Air Force test a drone-like, experimental weapon that targets electronics while sparing buildings and human lives. It sounds too good to be true, which it well might be, given the range of mishaps that have plagued US drones. <br />
<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199548&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/xiNXTbLNN7M" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-89098724792233487132012-10-30T01:10:00.001-04:002012-10-30T01:10:06.182-04:00Attacker grabs data for 3.6 million South Carolina taxpayers; governor wants to see culprit "brutalized"<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/WccLOFYyfok/">Attacker grabs data for 3.6 million South Carolina taxpayers; governor wants to see culprit "brutalized"</a>: She's got a right to be incensed, with 77% of the state's population's Social Security numbers being snatched out from under the Department of Revenue. But what's the appropriate penalty for the department, for the crime of leaving the data unprotected? <img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199883&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/WccLOFYyfok" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-28731371642232443802012-10-30T01:09:00.001-04:002012-10-30T01:09:57.377-04:00"STD-like" virus killing off Borderlands 2 video game characters<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/CUK271wxa1s/">"STD-like" virus killing off Borderlands 2 video game characters</a>: Gearbox, the maker of the popular game Borderlands 2, is warning Xbox 360 users to be careful of who they play with, following a rash of reports of unexplained character deaths. <br />
<br />
The culprit: a software flaw that appears to be spreading, "STD-like", from Borderlands 2 "modders" to other law-abiding players.<br />
<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199915&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/CUK271wxa1s" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-81656497424925615552012-10-30T01:08:00.001-04:002012-10-30T01:08:07.850-04:00Windows 8 security overview - Safest Windows ever?<a href="http://feedproxy.google.com/~r/nakedsecurity/~3/M0zMYc2o0BU/">Windows 8 security overview - Safest Windows ever?</a>: Windows 8 is now available and Microsoft is touting the entirely new user interface and app store. What security enhancements were made over Windows 7 and are these changes reason enough to upgrade?<img alt="" border="0" height="1" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=199936&subd=sophosnews&ref=&feed=1" width="1" /><img height="1" src="http://feeds.feedburner.com/~r/nakedsecurity/~4/M0zMYc2o0BU" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-81542361288269990782012-10-30T00:51:00.003-04:002012-10-30T00:51:33.385-04:00Daily Hacker News for 2012-10-12<a href="http://www.daemonology.net/hn-daily/2012-10-12.html">Daily Hacker News for 2012-10-12</a>: The 10 highest-rated articles on<br />
<a href="http://news.ycombinator.com/">Hacker News</a><br />
on October 12, 2012 which have not appeared on any previous<br />
<a href="http://www.daemonology.net/hn-daily/">Hacker News Daily</a><br />
are:<br />
<br />
<ul><li><br />
<a href="http://www.circuits.io/">A circuit and PCB editor in the browser</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4640583">(comments)</a><br />
</li>
<li><br />
<a href="http://mmcgrana.github.com/2012/10/introducing-go-by-example.html">Introducing Go by Example</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4641520">(comments)</a><br />
</li>
<li><br />
<a href="http://meta.slashdot.org/story/12/10/11/0030249/linus-torvalds-answers-your-questions">Linus Torvalds Answers Your Questions</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4641588">(comments)</a><br />
</li>
<li><br />
<a href="http://dmin.es/aws-cheatsheet">AWS Costs Cheat Sheet</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4641807">(comments)</a><br />
</li>
<li><br />
<a href="http://maximebf.com/blog/2012/10/building-websites-in-python-with-flask/#.UHc5pLTc3w4">Building websites in Python with Flask</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4642886">(comments)</a><br />
</li>
<li><br />
<a href="http://selfstarter.us/">Show HN: We open sourced Lockitron's crowdfunding app</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4643175">(comments)</a><br />
</li>
<li><br />
<a href="http://laurasanders.net/a-primer-on-sexism-in-the-tech-industry-by-an-actual-girl/">On sexism in the tech industry - rebuttal</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4644475">(comments)</a><br />
</li>
<li><br />
<a href="http://www.jwz.org/blog/2012/05/turtles-all-the-way-down-or-gliders-or-glider-turtles/">The game of life emulated in the game of life</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4644679">(comments)</a><br />
</li>
<li><br />
<a href="https://www.google.com/search?q=conways+game+of+life">Googling for "conway's game of life" gives a simulation in the results page</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4645457">(comments)</a><br />
</li>
<li><br />
<a href="http://blogs.hbr.org/bregman/2012/10/if-youre-too-busy-to-meditate.html">If You're Too Busy to Meditate, Read This</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4645844">(comments)</a><br />
</li>
</ul>Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-39924234995789223522012-10-30T00:51:00.001-04:002012-10-30T00:51:13.866-04:00Daily Hacker News for 2012-10-18<a href="http://www.daemonology.net/hn-daily/2012-10-18.html">Daily Hacker News for 2012-10-18</a>: The 10 highest-rated articles on<br />
<a href="http://news.ycombinator.com/">Hacker News</a><br />
on October 18, 2012 which have not appeared on any previous<br />
<a href="http://www.daemonology.net/hn-daily/">Hacker News Daily</a><br />
are:<br />
<br />
<ul><li><br />
<a href="http://www.ioccc.org/years.html#2012">International Obfuscated C Code Contest Winners</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4666356">(comments)</a><br />
</li>
<li><br />
<a href="http://www.meteor.com/blog/2012/10/17/meteor-050-authentication-user-accounts-new-screencast">Meteor releases authentication, accounts system, and new screencast</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4666686">(comments)</a><br />
</li>
<li><br />
<a href="http://blog.scalyr.com/2012/10/16/a-systematic-look-at-ec2-io/">EC2 I/O</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4666855">(comments)</a><br />
</li>
<li><br />
<a href="http://thenextweb.com/insider/2012/10/18/color-gets-acquired-by-apple-rumor/?utm_medium=Spreadus&awesm=tnw.to_a68g&utm_source=Twitter&utm_campaign=social%20media">Apple Said to Acquire Color</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4667217">(comments)</a><br />
</li>
<li><br />
<a href="http://arstechnica.com/information-technology/2012/10/ubuntu-12-10-quantal-quetzal-takes-flight-with-a-bag-full-of-juju/">Ubuntu 12.10 Quantal Quetzal released</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4667762">(comments)</a><br />
</li>
<li><br />
<a href="https://www.gosquared.com/resources/2400-flags">Free Flag Icons</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4668315">(comments)</a><br />
</li>
<li><br />
<a href="http://programmers.stackexchange.com/questions/168751/is-the-use-of-utf8-preferable-to-utf8-true">Is the use of “utf8=✓” preferable to “utf8=true”?</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4668373">(comments)</a><br />
</li>
<li><br />
<a href="http://www.wineanorak.com/corks/howcorkismade.htm">How cork is made</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4668526">(comments)</a><br />
</li>
<li><br />
<a href="http://chrome.blogspot.com/2012/10/the-new-chromebook-for-everyone.html">New $250 Chromebook</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4669611">(comments)</a><br />
</li>
<li><br />
<a href="http://www.ubuntu.com/#12.10">Ubuntu 12.10 Now Available</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4669994">(comments)</a><br />
</li>
</ul>Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-67016155732951298992012-10-30T00:50:00.001-04:002012-10-30T00:50:06.868-04:00Daily Hacker News for 2012-10-21<a href="http://www.daemonology.net/hn-daily/2012-10-21.html">Daily Hacker News for 2012-10-21</a>: The 10 highest-rated articles on<br />
<a href="http://news.ycombinator.com/">Hacker News</a><br />
on October 21, 2012 which have not appeared on any previous<br />
<a href="http://www.daemonology.net/hn-daily/">Hacker News Daily</a><br />
are:<br />
<br />
<ul><li><br />
<a href="https://github.com/jacobian/djangobook.com/">The Django Book is getting updated </a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4676636">(comments)</a><br />
</li>
<li><br />
<a href="http://www.phoronix.com/scan.php?page=news_item&px=MTIxMTA">Ubuntu ported to the Nexus 7</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4676826">(comments)</a><br />
</li>
<li><br />
<a href="http://singlepageappbook.com/">Single page apps in depth (new free book)</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4677497">(comments)</a><br />
</li>
<li><br />
<a href="http://startupschool.org/?video">Watch YC Startup School 2012 Live</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4677870">(comments)</a><br />
</li>
<li><br />
<a href="http://news.ycombinator.com/item?id=4678064">FBI Hack news on Hackernews is Fake</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4678064">(comments)</a><br />
</li>
<li><br />
<a href="http://torrentfreak.com/pirate-bay-founder-held-in-solitary-confinement-write-him-a-letter-today-121020/">Pirate Bay Founder Held In Solitary Confinement</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4678223">(comments)</a><br />
</li>
<li><br />
<a href="http://www.wired.com/magazine/2007/04/feat_cia/">How the CIA Used a Fake Sci-Fi Flick to Rescue Americans From Tehran (2007) </a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4679365">(comments)</a><br />
</li>
<li><br />
<a href="http://yuzhikov.com/articles/BlurredImagesRestoration1.htm">Restoration of defocused and blurred images</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4679801">(comments)</a><br />
</li>
<li><br />
<a href="http://www.freakonomics.com/2012/10/16/when-a-daughter-dies/">When A Daughter Dies</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4679864">(comments)</a><br />
</li>
<li><br />
<a href="http://lcamtuf.coredump.cx/gcnc/">Guerrilla guide to CNC machining, mold making, and resin casting</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4679939">(comments)</a><br />
</li>
</ul>Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-32883216144179939532012-10-30T00:49:00.001-04:002012-10-30T00:49:35.079-04:00Daily Hacker News for 2012-10-29<a href="http://www.daemonology.net/hn-daily/2012-10-29.html">Daily Hacker News for 2012-10-29</a>: The 10 highest-rated articles on<br />
<a href="http://news.ycombinator.com/">Hacker News</a><br />
on October 29, 2012 which have not appeared on any previous<br />
<a href="http://www.daemonology.net/hn-daily/">Hacker News Daily</a><br />
are:<br />
<br />
<ul><li><br />
<a href="http://en.wikipedia.org/wiki/Illegal_number">Illegal Numbers</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4710007">(comments)</a><br />
</li>
<li><br />
<a href="http://bits.blogs.nytimes.com/2012/10/28/i-b-m-reports-nanotube-chip-breakthrough/?hp&pagewanted=all">I.B.M. Reports Nanotube Chip Breakthrough</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4710256">(comments)</a><br />
</li>
<li><br />
<a href="http://swanson.github.com/blog/2012/10/28/i-dont-have-time.html">I Don't Have Time</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4710535">(comments)</a><br />
</li>
<li><br />
<a href="http://www.slate.com/articles/health_and_science/human_evolution/2012/10/evolution_of_lactose_tolerance_why_do_humans_keep_drinking_milk.single.html">The lactose-tolerance mutation</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4710596">(comments)</a><br />
</li>
<li><br />
<a href="http://www.amazon.com/?iPad">Amazon.com criticising new iPad on homepage</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4711786">(comments)</a><br />
</li>
<li><br />
<a href="http://www.frameloss.org/2012/10/28/hover-fail/">Always “hover” before you click? Wrong.</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4712163">(comments)</a><br />
</li>
<li><br />
<a href="http://infotrope.net/2012/10/29/no-i-still-dont-want-to-work-for-google/">No, I still don't want to work for Google</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4712230">(comments)</a><br />
</li>
<li><br />
<a href="http://googleblog.blogspot.com/2012/10/nexus-best-of-google-now-in-three-sizes.html">Nexus: The best of Google, now in three sizes</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4712924">(comments)</a><br />
</li>
<li><br />
<a href="http://dianeravitch.net/2012/10/27/nc-teacher-i-quit/">North Carolina teacher's resignation letter</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4713000">(comments)</a><br />
</li>
<li><br />
<a href="http://www.apple.com/pr/library/2012/10/29Apple-Announces-Changes-to-Increase-Collaboration-Across-Hardware-Software-Services.html">Scott Forstall leaves Apple</a><br />
<br />
<a href="http://news.ycombinator.com/item?id=4714473">(comments)</a><br />
</li>
</ul>Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-88449160107497264112012-10-30T00:44:00.003-04:002012-10-30T00:44:21.731-04:00Remotely controlled Malware as Browser extensions<a href="http://feedproxy.google.com/~r/TheHackersNews/~3/cvdur4aY_ik/remotely-controlled-malware-as-browser.html">Remotely controlled Malware as Browser extensions</a>: <br />
"Browser extensions extend the functionality of the web browser. These extensions improve the appearance, functionality, security or other parts of the browser. Extensions were also developed with malicious intent, in order to generate revenue or just spread the code between more and more browsers. The possibility of a malicious browser extension is almost infinite, but we have not seen very<br />
<div><a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=cvdur4aY_ik:0jByH-hP-oA:yIl2AUoC8zA"><img border="0" src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" /></a></div><img height="1" src="http://feeds.feedburner.com/~r/TheHackersNews/~4/cvdur4aY_ik" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0tag:blogger.com,1999:blog-882217987463281956.post-38547203498597374082012-10-30T00:44:00.001-04:002012-10-30T00:44:06.691-04:00NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)<a href="http://feedproxy.google.com/~r/TheHackersNews/~3/YOavPSLnoNQ/nasa-jet-propulsion-laboratory.html">NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)</a>: <br />
<!-- adsense --><br />
Yesterday, we report about the security breach in US Government computers belongs to NASA restricted area website and Hacker dump out the complete source code and files from server of the website.<br />
Today another hacker claim a quick XSS (Cross site scripting) Vulnerability in NASA's Jet Propulsion Laboratory website (http://onearth.jpl.nasa.gov/) via a pastebin note.<br />
Hacker is<br />
<div><a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=YOavPSLnoNQ:H4dSyQXZ2Yw:yIl2AUoC8zA"><img border="0" src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" /></a></div><img height="1" src="http://feeds.feedburner.com/~r/TheHackersNews/~4/YOavPSLnoNQ" width="1" />Wyretap Networkhttp://www.blogger.com/profile/06447038069401420412noreply@blogger.com0