2007.02.26 Daily Security Reading
by Rodney Campbell on Feb.26, 2007, under Security
Browser vulnerabilities and attacks will continue to mount
Even as software makers add more sophisticated security features to their browsers and rush to patch documented flaws more quickly, experts maintain that holes in the programs will continue to allow for widespread malware attacks.
Bots and DDoS attacks – a primer
Knowing the inner workings of botnets and their attack styles can help you formulate a defense — or outlast an attack.
The first AACS device key has leaked
The intense effort by the fair-use community to circumvent AACS (the content protection protocol of HD DVD and Blu-Ray) has produced yet another stunning result: The AACS Device Key of the WinDVD 8 has been found, allowing any movie playable by it to be decrypted. This new discovery by ATARI Vampire of the Doom9 forum is based on the previous research of two other forum members, muslix64 (who found a way to locate the Title Keys of single movies) and arnezami (who extracted the Processing Key of an unspecified software player) – now we wait to see the revocation mechanism in action.