http://convergence.io
On 22 February 2012 19:12, Jeffrey Walton noloa...@gmail.com wrote:
It appears to be official.
Trustwave issued MitM certificates, which is deceptive, unethical, and
contrary to its agreement for inclusion.
Mozilla just rewarded their violations of trust by continuing
It turns out that it was a problem with firefox. However, I do not believe
I had any malicious addons or extensions for a few reasons. 1) I only had 4
extensions, adblock plus, pentadactyl, firebug, and noscript.
2) they were all vetted (presumably) by mozilla.
I believe, and this is simply
So there I was, innocently posting anti-SOPA links on my wall. I close my
facebook tab temporarily, open a new one a few minutes later, and I’m
logged out of my account.
“Well that’s odd” I think. So I log back in.
“Your computer has malware!” Facebook says to me. They tell me that my
computer
Sorry! We can't display this content while you're viewing Facebook over a
secure connection (https).
To use this app, you'll need to switch to a regular connection (http).
On Tue, Mar 1, 2011 at 8:56 PM, Andrew Farmer andf...@gmail.com wrote:
On 2011-02-28, at 09:42, Nathan Power wrote:
3.
I think the fact that they have that info in their systems is pretty awful.
I wouldn't trust them with my personal information. How do you know some
disgruntled employee won't take it all and sell it? Or that their database
servers are insecure? BB have shown that they have incompetent employees
where is the password for the archive?
On Wed, Feb 2, 2011 at 1:19 PM, gregorydev...@aim.com wrote:
Do not meddle in the affairs of hackers, for they are subtle and quick
to anger
When one thinks of frauds in the infosec community, most people are
quick to point to Gregory D Evans of LIGATT
Paypal is affected by an XSS vulnerability where it fails to validate
input for the following url:
https://www.paypal.com/xclick/business=
One can add arbitrary javascript with no need for any filter evasion.
https://www.paypal.com/xclick/business=script alert(xss); /script
As far as I