The upcoming BlackHat conference is going to have a presentation on a tool for hacking home routers, which the skriptkiddies eagerly await; and I expect this will get lots of play and not a little wild-eyed panickery going on by irresponsible "tech" bloggers.
(Undoubtedly Intego will issue a press release stating "Sky Falls Again! Buy Our Umbrellas or Your Mac Will DIEEEE!" bit of FUD about this.) <http://blogs.forbes.com/firewall/2010/07/13/millions-of-home-routers-vulnerable-to-web-hack/> I don't know if the exploitation vector depends on the OS of your computer (I don't think so), but the simplest main fix it to change the default router admin password to something non-obvious and certainly NEVER leave it at the default 'admin'. (Note 1: This should be a rule for ANY device that ever has a password associated with it.) (Note 2: This is the administrative password for configuring the router itself, NOT the WEP or WPA password) I do not yet know if Apple Airport devices are vulnerable. -- Bruce Johnson University of Arizona College of Pharmacy Information Technology Group Institutions do not have opinions, merely customs -- You received this message because you are a member of G-Group, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/g3-5-list
