MySpace users at risk: 56,000 usernames and passwords published
http://tech.monstersandcritics.com/news/article_1247243.php/MySpace_users_at_risk_56000_usernames_and_passwords_publishedWhen does the line between security research and malicious criminal intent blur? When does proof-of-concept become targeted and dangerous? The answer: when you set out to exploit two publicly known holes in two different browsers, and then post the results to a public mailing list.
The website link and name of the mailing list will remain unknown for this article. Monsters and Critics will not spread the information any more than it already has leaked over the internet. The information is a list; one that contains fifty-six thousand usernames and passwords for accounts on the popular social-networking site MySpace.
How did this happen? This was allowed to happen because Internet Explorer versions 6 and 7, as well as Firefox versions 1.5.x and 2.0.x, are open to an exploit that is yet unpatched by either vendor. Both vendors are aware of these exploits and both have been repeatedly warned about these flaws and the risk they pose; code to prove these exploits have been around the web several times. These proof-of-concept codes exist to serve two things, prove to the vendor the threat is real and to allow others to gain insight on how the vulnerability works.
-----------------------------------------------
A better Browser ...
http://www.opera.com ... But that's just my opinion
:)