Skip to main content

Software-Programming

OpenBSD 5.0 released

posted onNovember 2, 2011
by l33tdawg

OpenBSD 5.0 has been published, six months after the release of version 4.9. The OpenBSD project's newest release of the free BSD based UNIX-like operating system includes a number new and updated drivers, performance improvements and new features.

OpenBSD 5.0 includes the GNOME 2.32.2, KDE 3.5.10 and Xfce 4.8.0 desktop environments. It also contains a number of new and updated packages including versions 3.5.19, 3.6.18 and 5.0 of the Firefox web browser, PHP 5.2.17 and 5.3.6, LibreOffice 3.4.1, and Chromium 12. The release includes September's release of OpenSSH 5.9.

Lookout Mobile Security now keeps your Android tablet safe

posted onOctober 27, 2011
by l33tdawg

After releasing Lookout for iOS devices, Lookout Mobile Security has updated its Android protection app, this time optimizing it for Android tablets. If you’re looking for a solution to backup your data, locate your tablet when it’s missing or stolen, and manage its security remotely, Lookout for Android tablets is for you. Lookout also acts as an antivirus to help you block malware, spyware, and Trojans, and it can locate your tablet when it’s missing by activating a loud alarm (even if it’s on silent).

THC-SSL-DOS tool targets secure connections

posted onOctober 26, 2011
by l33tdawg

The THC-SSL-DOS tool, which was released today, purportedly exploits a flaw in Secure Sockets Layer (SSL) renegotiation protocol by overwhelming the system with multiple requests for secure connections. SSL renegotiation allows websites to create a new security key over an already established SSL connection.

A German group known as Hackers Choice said that it released the exploit to bring attention to flaws in SSL, which allows sensitive data to flow between websites and an individual user's computer without being intercepted.

SemiTether for iOS 5 relieves some of the tethered jailbreak pain

posted onOctober 24, 2011
by l33tdawg

Folks have been jailbreaking iOS 5 for almost as long as Apple’s latest mobile operating system has been available. There’s just one catch: the only tools available provide a tethered jailbreak. That means you need to connect your mobile device to a computer and run redsn0w or ultrasn0w every time you reboot — otherwise you won’t be able to get past the boot logo and your device will be unusable until you do perform a tethered boot with a computer.

Amazon's Silk browser: Now EFF approved. Really!

posted onOctober 20, 2011
by l33tdawg

The Silk browser was only one of many revelations at Amazon's Kindle event last month, but it was a doozy. Expected to ship initially only on the Kindle Fire in November, Silk promises to learn how you browse and to predict where you're going to surf to next. That kind of stickiness with your personal data left many security experts and some lawmakers uncomfortable. But the Electronic Frontier Foundation now says it believes Amazon will provide users with the tools to disentangle themselves.

Zend builds a pick-your-partner PHP cloud platform

posted onOctober 20, 2011
by l33tdawg

Zend Technologies took the wraps off a new cloud service for developing and deploying software developed in the PHP web server-side scripting language on Tuesday at the ZendCon conference in Santa Clara, CA. Called phpcloud.com, the service lets developers rapidly build applications based on a number of frameworks and then deploy them into production.

SQL injection attack has compromised nearly 200,000 ASP.Net sites

posted onOctober 20, 2011
by l33tdawg

Hackers are in the midst of a massively successful SQL injection attack targeting websites built on Microsoft's ASP.Net platform. About 180,000 pages have been affected so far, security researchers say.

Attackers have planted malicious JavaScript on ASP.Net sites that causes the browser to load an iframe with one of two remote sites: www3.strongdefenseiz.in and www2.safetosecurity.rr.nu, according to security researchers at Armorize who discovered the attack. From there, the iframe attempts to plant malware on the visitor's PC via a number of browser drive-by exploits.