Monday, June 25, 2007

Apple iPhone Exploit

Anyone want to make a sploit for the Apple iPhone.... it looks to be a very nice target. From the tech specs
it will contain bluetooth, wireless LAN 802.11 b/g, and cellular technologies. This leads me to believe that a effective virus could travel via the human user to infect a lot of devices upon it's path. To me it looks like it will be connected to the Internet all the time, since it looks like it is a Internet terminal that basically just uses voice over Internet Protocol (VOIP). It also sounds like these devices will not be shipping with any sort of firewall.
Even Gartner recommends that companies not adopt the iPhone because of it non-corporate friendliness.
Anyone got a zero day exploit for one of these bad boys yet. Apple and AT&T get ready for a new realm of security concerns.
Get ready for June 29.

Saturday, June 9, 2007

Hidden USPS Mail Hack

This is a interesting one, I have unknowingly used this hack for some EBay Sales. the United States Postal System advertises on their Site that if you do not like something someone sent you unsolicited in the mail you have the option of:
  • Keeping it (if you like it)... finder's keepers.
  • Throwing it away
  • or marking it "Return to Sender"

Interesting enough the last option marking it "return to sender". I have had people mark return to sender on Priority mail boxes and they return back to me. Attach tracking to the item and you can track it both going and coming back.

It is not as good as the early eighties, when you could just reverse the sender with the return address and mail without a stamp and the postal service would deliver for free.

If you correspond with someone on a regular basis it may be of value. You may have to watch box weight.

You can also aggravate the credit card or sales ads you recieve by returning them to sender too.

http://www.usps.com/postalinspectors/fraud/merch.htm

YMMV.