Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Tech News


Drive-by pharming attacks

Symantec announced a new vulnerability on Wednesday that threatens millions of computer users. Drive-by pharming attacks stem from malicious code embedded in an innocent-looking Web site, MySpace profile or e-mail. When the victim clicks on the site, the code is surreptitiously downloaded onto their computer. It then uses JavaScript to change the DNS settings of the user\'s broadband router. More info here.

Get paid to hack vista and IE7.

In its first Quarterly Vulnerability Challenge for 2007, iDefense offered $8,000 for each flaw that can be remotely exploited in Vista or Internet Explorer 7. The company will award bounties for up to six different vulnerabilities. The company will pay an additional $2,000 to $4,000 for working exploit code. The Quarterly Vulnerability Challenges target specific high-profile applications and software. Previous Quarterly Vulnerability Challenges focused on remotely exploitable flaws in instant messaging software and in the major browsers, including Apple\'s Safari, Mozilla\'s Firefox, and Opera\'s browser. Read the full article at: http://www.securityfocus.com/brief/405 Submitted by: bardonicus

iPhone

Well it\'s been rumored for months. People have made their own prototypes in Photoshop and have googled for a lifetime for more information but Apple have finally released it. iPhone combines three products — a revolutionary mobile phone, a widescreen iPod with touch controls, and a breakthrough Internet communications device with desktop-class email, web browsing, maps, and searching — into one small and lightweight handheld device. iPhone also introduces an entirely new user interface based on a large multi-touch display and pioneering new software, letting you control everything with just your fingers. So it ushers in an era of software power and sophistication never before seen in a mobile device, completely redefining what you can do on a mobile phone. Original Source Apple.com

MD5 Library is currently down.

On December 31st, 2006, the HD that hosts the bot crashed. The bot will be down until I can raise enough money to cover the cost of taking the drive to a data recovery center. The cost is going to be $200, once I can raise half ($100), I will cover the rest. Send a donation via PayPal to aefe@adelphia.net or contact ahmedc123 on AIM to donate and get the project running again. If I cannot get enough donations, I\'m afraid that this will be the end of MD5 Library. - Jake

Worm In Skype

Computer security analysts are studying reports of a worm that may be circulating via a feature in Skype\'s popular Voice over IP service. Security vendor Websense said the worm spreads through Skype\'s chat feature. Users receive a message asking them to download a file called \"sp.exe.\" The executable is a Trojan horse that can steal passwords. If a user runs the Trojan it triggers another set of code to spread itself. The first infected PCs appeared in the Asia-Pacific region, particularly in Korea, Websense reported on its blog today. It said it was still investigating the issue. The rest of the article can be found here -ZTB

Firefox 3 on the way

Mozilla is calling on developers to help it ensure that the next version of the open source web browser is solid. And it has released an alpha version of Firefox 3 for developers to play with. The superstructure of Firefox 3 alpha is built around Gecko 1.9, an updated layout engine. The browser, tentatively scheduled for delivery in May 2007, is also due to include features held back from Firefox 2, such as the revamped Places system for storing bookmarks and a re-jigged history function. Read more about it here. -BluMoose