katterjohn writes: "After almost 10 years of work, Wireshark 1.0 has been released. Wireshark is the award-winning protocol analyzer, formerly known as Ethereal, that has taken the packet sniffers to a whole new level. A list of all the goodies is here."
katterjohn writes: The Beta version of the iPhone 2.0 operating system has already been cracked by the iPhone Dev Team.
"Apparently, this time it's final. Previous hacks have been tied to a specific version of the iPhone OS, meaning that the hackers were playing a cat-and-mouse game with Apple: the cracks, jailbreaks and unlocks were broken with each new update.
This latest crack actually bypasses the iPhone bootloader (the software which loads the OS when a computer is switched on) and allows unsigned code to be written to and run on the iPhone. Think of it as like finding the keys to a house, and the owner can't change the locks."
katterjohn writes: ""The FBI and Department of Homeland Security are warning US law enforcement agencies to keep a sharp look-out for "a new type of terrorism" in which apparently-pregnant women suddenly go bang due to the fact they aren't really mums-to-be at all, but cold-hearted suicide bombers packing explosives inside a swelling prosthetic belly."
katterjohn writes: "Version 3.1 of the Metasploit Framework — the cross-platform development platform for testing and creating new security tools and exploits — has been released. Project manager H D Moore says "Metasploit 3.1 consolidates a year of research and development, integrating ideas and code from some of the sharpest and most innovative folks in the security research community."
From the release notes: "The latest incarnation of the framework includes a bristling arsenal of exploit modules that are sure to put a smile on the face of every information warrior. Notable exploits in the 3.1 release include a remote, unpatched kernel-land exploit for Novell Netware, written by toto, a series of 802.11 fuzzing modules that can spray the local airspace with malformed frames, taking out a wide swath of wireless-enabled devices, and a battery of exploits targeted at Borland's InterBase product line."