.:[ktxgoogle]:.
so you can use the google safesearch diagnostic to check out what google has to say about the security of a given domain. nifty!.. n maybe those google cats are a little too honest? ish?
.:[ktxwhatev]:.
it's tough to know what to say about the nsa wiretap case getting dismissed... nice try eff...
i was talking w/ someone recently who was going on about how there are still significant constitutional barriers between foreign and domestic surveillance... yea, whatever you say...
so here's a shout to a great prank:
.:[ktxphone]:.
mobile malware is getting pretty crazy creative, at least in the lab ;) 3d maps of whatever your phone can see. i think there's a lot of potential for stuff in this space...
.:[ktxattackers]:.
i'd be willing to bet this attack exploited a binary planting vuln of some type... it's nifty how the attacker was probably leaning on the valid sig on the service executable to throw off investigators. i imagine that the dll was basically just an unwrapper, and the third file maybe had an extension that isn't generally subjected to much attention by av/scanner tools...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment