Home Code Snippets Oracle Reference Oracle Functions Oracle Error Codes Forum Oracle Jobs Oracle Blogs

Tag Archives: Security

Zeus Botnet Traps Researchers With Honeypot

The authors of a recent Zeus Trojan exploit, which targeted federal taxpayers, also set up a special honeypot trap for researchers who might investigate the attack. They set up a phony "administrative panel" that fed the researchers fake statistics on the number of Zeus-infected machines, as well as fake "botnet" software that actually gathered intelligence […]

Posted in Uncategorized | Also tagged , Comments Off

Zombie Cookies From Hell

You're pertty savvy when it comes to internet privacy, right? You have cookies turned off by default, and you run NoScript, AdAware, and FlashBlock. You think you're taking reasonable measures to protect your privacy, but you might as well not bother. Zombie cookies are here, and they're nearly impossible to get rid of. It's every […]

Posted in Uncategorized | Also tagged , , Comments Off

Facebook Launches Location Based Stalking Tool

Facebook announced that it will shortly launche a "Location Based Stalking Tool", err, I mean, "Product". This service will let everyone spy on your current location. In other words your stalkers will know where you are, and your local burglars and bad guys will know where you aren't.  What could possibly go wrong?

Posted in Uncategorized | Also tagged , , Comments Off

Basic Security Guidelines for Programming In Any Language

If you have a website, it's being attacked, probably on a daily basis. Looking at your server logs will almost undoubtedly show you many, many attempts at gaining entry by password-guessing bots or by repeated attempts to exploit your web forms. Expect that every form you use will be attacked mindlessly over and over by […]

Posted in Uncategorized | Also tagged , , , , Comments Off

Microsoft Secretly Fixes Two Severe Bugs

A recent security patch from Microsoft secretly patched two "severe" exploits that posed a risk to Windows users. Microsoft didn't fully disclose the exploits, putting Windows users at risk. According to Nicolás Economou, a researcher with Core Security, Microsoft patch MS10-024 fixed two serious bugs that made it possible for malicious users to easily intercept […]

Posted in Uncategorized | Also tagged , Comments Off

Possible Internet Breakage On May 5th

On May 5 2010, Phase 1 of the DNSSEC (Domain Name System Security Extensions) protocol will be pushed out to the 13 root servers that control domain name lookups worldwide. For some businesses and end users, internet access may come to an abrupt halt shortly afterward. "Oh noes, teh intarweb is broken!" Yes, parts of […]

Posted in Security | Also tagged , Comments Off

Good News For Stalkers

Security Researchers Find All GSM Phones Open To Hacking & Tracking Yes, it's good news for stalkers and indentity thieves everywhere: Don Bailey from iSec Partners and security researcher Nick DePetrillo have found a vulnerability in all GSM cell phones that can give an attacker the unrestricted ability to locate any GSM handset anywhere in […]

Posted in Uncategorized | Also tagged , , , Comments Off

The Largest Link-Hack In History

No matter what your web site does or what it's about, it's the target of spammers, and by extension, the target of hackers. Spammers want to fill your site with links to their spammy products (pills, software, etc). Since any reputable site owner isn't going to willingly install spam links, the way to do this […]

Posted in General | Also tagged , , 1 Comment

Large Scale Gmail Spam Attack?

Rumors have been circulating on the intarwebs about a sudden increase in hacked Gmail accounts for the last few days, and it now looks like it's confirmed. Robert McMillan from PC World reports in that "Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them […]

Posted in General | Also tagged , Comments Off

Biometric IDs: A Really, Really Bad Idea

A lot of security "experts" like to push the idea of "biometric security", that is, using some part of your biological identity (a fingerprint, a retinal pattern, etc) to use as an access code instead of crusty old things like passwords. This sounds great, I mean, only you have your fingerprints, right? And who could […]

Posted in General | Also tagged , Comments Off