[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <926951e60710250952i674a7bb7k2e544af59dcaa3c2@mail.gmail.com>
Date: Thu, 25 Oct 2007 11:52:45 -0500
From: "Muskegon Whitehall" <muskegon.whitehall@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: "Hackers can divert Vonage calls: security
firm" =>?
>I have not heard of any chatter on this one..
>http://ca.today.reuters.com/news/newsArticle.aspx?type=technologyNews&storyID=2007-10-24T183023Z_01_N24160249_RTRIDST_0_TECH-VONAGE-HACKERS-COL.XML&archived=False<http://ca.today.reuters.com/news/newsArticle.aspx?type=technologyNews&storyID=2007-10-24T183023Z_01_N24160249_RTRIDST_0_TECH-VONAGE-HACKERS-COL.XML&archived=False>>does
anyone know different or is this just some company pimping ??
Someone is fishing for VC.
http://www.sipera.com/index.php?action=company,press_release&id=366
http://www.sipera.com/index.php?action=resources,threat_advisory
Sipera kindly alerted the media, so none would miss this groundbreaking
research: cleartext protocols can be intercepted! Not since military-grade
XSS 0day on cable modems has a clearer, and more present danger existed.
ThreatCon: Critical.
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists