BBspot


Archives
 
Top 11
Top 11 Things Geeks Would Do After Being Rescued from a Mine
Classics
How White and Nerdy Are You?
Bush Proposes Faith- Based Firewalls for Government Computers
Microsoft Purchases Evil From Satan
Slashdot Story Generator
Which OS Are You?
Teen Using MySpace to Lure Bands to Los Angeles
The BBook of Geek
Recommended
Fark
Mental Floss
Geek Press
Wil Wheaton
Jonathan Coulton
I-Mockery
Jokes Gallery
Funny Pictures
More Links

Monday, May 21 12:00 AM ET

Security Firm Issues Warning on Web 2.0 Exploit

By Scott Small

Phoenix, AZ - Security firm Ballixtup LLC announced today a proof of concept exploit which could be used on popular Web 2.0 sites. The exploit shows how malformed mouseOver code can be used to extract Social Security numbers, credit card numbers and other sensitive data. 

John Deloney, a spokesperson for Ballixtup, warned "Until a patch is rolled out to fix this vulnerability, we recommend you change your Internet settings to turn off Web 2.0 code."

In some cases it may even be necessary to roll back to Web 1.0, but only in extreme cases. Although this could affect any operating system with a browser, it will have the greatest impact on Microsoft Windows because of its Web 2.0 integration into the operating system. MS has announced plans to start beta testing their new software which will remove malicious websites. It will be called Windows Malicious Web Site Removal Tool.

Related News

MacGyver Foils Airport Security

Bush Proposes Faith-based Firewalls for Government Computers

Babies Banned from Flying

Tammy Shroyer from Microsoft said, "With our Malicious Web Site Removal Tool, Internet Explorer users will be able to protect themselves and others, by completely removing malicious Web 2.0 site from the Internet."

The founder of Digg, a popular Web 2.0 site, Kevin Rose said, "You won't be seeing this kind of exploit on a site like Digg to extract personal information from our users.  We plan on using the code to change everyone's Social Security number into the AACS hex code."

It is expected that a patch to Web 2.01 will fix this exploit, but is not expected until mid-July. 

Story Options:
Related
Discuss
Share
Print

Warning: Undefined variable $HTTP_SERVER_VARS in /home/bbspot/public_html/cgibin/prev_next_links.php on line 3

Warning: Trying to access array offset on value of type null in /home/bbspot/public_html/cgibin/prev_next_links.php on line 3

Warning: include_once(/work/php_mgr/sql.inc): Failed to open stream: No such file or directory in /home/bbspot/public_html/cgibin/prev_next_links.php on line 3

Warning: include_once(): Failed opening '/work/php_mgr/sql.inc' for inclusion (include_path='.:/opt/cpanel/ea-php80/root/usr/share/pear') in /home/bbspot/public_html/cgibin/prev_next_links.php on line 3

Warning: Undefined variable $db in /home/bbspot/public_html/cgibin/prev_next_links.php on line 5

Fatal error: Uncaught Error: Call to a member function qstr() on null in /home/bbspot/public_html/cgibin/prev_next_links.php:5 Stack trace: #0 {main} thrown in /home/bbspot/public_html/cgibin/prev_next_links.php on line 5

 
 
Follow on Twitter Follow Us on Twitter
Facebook Fan Us on Facebook
Amazon Find the BBook

 

  Politics Contact FAQs
A
D

Copyright 1999-2008 by BBspot LLC
BBspot is a satire news and comedy source and meant to be funny. If you are easily offended, gullible or don't have a sense of humor we suggest you go elsewhere.