Monthly Archives: February 2006

Pod Slurping!

A article on CNET describes how Abe Usher has written an application that can be loaded on a IPOD to steal sensitive information from a corporate network. The process works by scanning the network and grabbing document files such as … Continue reading

Posted in security, software | Leave a comment

New phishing techniques to fool online users.

Every day people are becoming aware of the problems posed by online shopping, browsing, and even messaging. The days of email that are obviously spam due to misspelled words and links that contain ip addresses instead of dns names are … Continue reading

Posted in security | Leave a comment