A picture is worth a thousand words…

… or maybe a few lines of malicious code?

Yup, it appears that hackers will shortly be able to post pictures on various websites (probably targeting social networking sites) and lure unsuspecting victims to browse a page with the infected picture or GIFAR. This GIFAR (GIF and JAR) will be interpreted by the browser as a normal GIF and displayed but the Java Runtime on the user’s machine will extract and execute it as a JAR file.

At Black Hat, researchers will show attendees how to create the GIFAR while omitting a few key details to prevent it from being used immediately in any widespread attack. – SlashDot News

For more information on this read the article on InfoWorld’s website.

Cape Town – Old and New

Yesterday a friend sent me some pictures of “Old” Cape Town which really make you think of how far we’ve come as a city and how things have changed over the years. I was trying to find some “new” photos for comparison and thanks to Michelle and a 4×4 forum member’s flickr photostream here are a few comparison photos – enjoy!

Skype Backdoor

Skype

I was reading a post this morning on MyBroadband and I was wondering about other IM/VoIP software out there to use as an alternative to landline/mobile communication to circumvent this ludicrous bill that they want passed in SA soon.

So, whom better than probably the most widely known and best-publicised product out there, Skype! And then I did a little digging and it didn’t take me long to come up with this article where they’re talking about a backdoor in Skype for listening in on VoIP calls or monitoring IM chats. Although Skype denies the allegations, it’s still of concern.

Skype VoIP Calls

Which brings me to another point, alternatives – trustworthy alternatives. The words “trust” and “internet” just don’t go hand in hand anymore these days or are we just becoming a bunch of cynics. So I looked at what other alternatives for IM/VoIP software there is out there and it’s almost a limitless list, where to begin, which is better?

Where to from here? Encrypted smoke-signals? Or do we just learn how to communicate telepathically (encrypted of course) to prevent Big Brother from listening in?