Home    News Archive    Translate Traducen
News January 2008
31 January 2008

Guides, Papers, etc
www.f-secure.com
Studying Malware Analysis. Read more

blog.washingtonpost.com
Wishing an (Un)Happy Birthday to the Storm Worm. Read more

www.itnews.com.au
Information is our only security weapon: Bruce Schneier. Read more

www.newyorker.com
The Spymaster. Read more

isc.sans.org
MS08-001 PoC exploit demonstrated. Read more

www.sophos.com
Make Viruz, On Demand - Hacking 101. Read more

isc.sans.org
Insignia Photo Frame Malware Request. Read more

isc.sans.org
Yet another Tax Scam. Read more

sunbeltblog.blogspot.com
Big Italian bank says "Google your password to see if it's good". Read more

sunbeltblog.blogspot.com
Update on the Snopes-pushing-adware situation. Read more

sunbeltblog.blogspot.com
Not an urban legend: Snopes pushes Zango. Read more

www.avertlabs.com
Spyware - A Morphing Campaign. Read more

blogs.msdn.com
New NX APIs added to Windows Vista SP1, Windows XP SP3 and Windows Server 2008. Read more

www.f-secure.com
PHP IRC Bot. Read more

ddanchev.blogspot.com
The Dutch Embassy in Moscow Serving Malware. Read more

blog.trendmicro.com
Chasing Storm into 2008. Read more

www.darkreading.com
Paper Outlines Methods for Beating Anonymity Technology. Read more

www.darkreading.com
'L0pht ' Reunion on Tap. Read more

www.darkreading.com
11 Truths We Hate to Admit. Read more

www.darkreading.com
Researchers, Vendors Gear Up for Whaling Attacks. Read more

www.darkreading.com
Exploit Could Taint Forensics. Read more

www.securityfocus.com
Mother, May I? Read more

www.viruslist.com
Spam Report: December 2007. Read more

 

Vulnerabilities & Exploits
securitytracker.com
SafeNet SoftRemote Lets Local Users Gain Elevated Privileges. Read more

securitytracker.com
Informix Storage Manager XDR Function Buffer Overflows Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com
IBM Hardware Management Console Pegasus CIM Bug Lets Remote Users Deny Service. Read more

securitytracker.com
Tripwire Enterprise Input Validation Hole Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
eTicket Input Validation Hole in 'index.php' Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
Firebird Buffer Overflow in Processing 'username' Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
BIG-IP Application Security Manager Input Validation Hole in '/dms/policy/rep_request.php' Permits Cross-Site Scripting Attacks. Read more

 

Tools:
metasploit3.com
Metasploit Framework v3.1 Released. Read more

www.wired.com
Autonet Mobile: Your Own Personal Hot Spot, Everywhere You Go. Read more

 

News
www.computerworld.com
New attack proves critical Windows bug 'highly exploitable'. Read more

business.theage.com.au
Russian call for 'internetpol' to fight cybercrime. Read more

www.theregister.co.uk
Skype Trojan wiretap plan leaks onto the net. Read more

www.computerworld.com
European court strikes blow against music industry fishing. Read more

www.vnunet.com
Malicious ads infect Expedia and Rhapsody. Read more

www.wtoctv.com
New Social Security Scam Making the Rounds. Read more

www.vnunet.com
Storm malware still blowing strong. Read more

www.greatfallstribune.com
Hacker steals Davidson Cos. clients' data. Read more

www.theregister.co.uk
Scientology website shielded against DDoS attack. Read more

28 January 2008

Guides, Papers, etc
www.net-security.org
Interview with Nitesh Dhanjani and Billy Rios, Spies in the Phishing Underground. Read more

www.viruslist.com
Wardriving in Caracas (Venezuela). Read more

isc.sans.org
Digital Hitchhikers Part Four. Read more

isc.sans.org
On a slow day, an interesting read. Read more

sunbeltblog.blogspot.com
New Western Union spam with Trojan in the wild. Read more

sunbeltblog.blogspot.com
Another Julie Amero situation might be developing... Read more

sunbeltblog.blogspot.com
A note of clarification on malware growth stats. Read more

sunbeltblog.blogspot.com
So what's up with all the NotchUp invites? Read more

sunbeltblog.blogspot.com
Lavasoft confirms negotiations to bundle Ask Toolbar. Read more

www.symantec.com
Banking in Silence. Read more

www.symantec.com
Banking with Confidence. Read more

www.insignia-products.com
Insignia 10.4” Digital Picture Frame (Model Number NS-DPF10A) Product Alert. Read more

blog.cpanel.net
Components of Random JavaScript Toolkit Identified. Read more

www.infoworld.com
Control user installs of software. Read more

www.eweek.com
Perimeter Security and the Great D.C. Porn-Surfing Scandal. Read more

www.koreatimes.co.kr
No Holiday for Virus Producers. Read more

www.unconfirmedsources.com
Microsoft Makes Zero Day Exploit Recommendation: Buy a Mac. Read more

lifehacker.com
Keep your passwords safe at public computers. Read more

 

Vulnerabilities & Exploits
securitytracker.com
CIMPLICITY Heap Overflow in 'w32rtr.exe' Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Proficy Real-Time Information Portal Lets Remote Authenticated Users Upload Arbitrary Files and Execute Arbitrary Code on the Target System. Read more

securitytracker.com
Proficy Default Login Method Does Not Encrypt User Passwords. Read more

securitytracker.com
PatchLink Update Temporary File Symlink Flaw in logtrimmer Lets Local Users Gain Elevated Privileges. Read more

 

Tools:
oss.coresecurity.com
Pass-The-Hash Toolkit. Read more

 

News
news.zdnet.co.uk
Greek police arrest 'one of world's best hackers'. Read more

www.washingtonpost.com
Details Emerge in French Bank Fraud Case. Read more

www.boingboing.net
German Bavarian gov't caught buying malware to intercept Skype calls. Read more

blog.wired.com
School Cop Investigated for Porn Link on Friend's MySpace Profile -- Updated. Read more

www.symantec.co
Trojan.Haradong Author and Accomplices Arrested. Read more

www.wired.com
Kazaa User Appeals Feds' Novel Use of Child Porn Law to Supreme Court. Read more

www.syracuse.com
'Turkish hacker' hits OCWA's site. Read more

www.computerworld.com
Data Breach Affects 650k Customers of 230 Retailers. Read more

27 January 2008

Guides, Papers, etc
sunbeltblog.blogspot.com
The growth of malware. Read more

www.f-secure.com
Case Closed. Read more

isc.sans.org
So.. Are all of the bad guys really on the outside? Read more

www.truthdig.com
The End of Privacy. Read more

blog.trendmicro.com
SEO Manipulation Begins for Super Bowl Malware Campaign. Read more

www.darkreading.com
Hacking Wireless Headsets. Read more

www.darkreading.com
Vulnerabilities: They're in the Air. Read more

www.darkreading.com
Interview With a Web App Security Pro. Read more

www.washingtonpost.com
'Money Mules' Help Haul Cyber Criminals' Loot. Read more

aolradio.podcast.aol.com
Security Now 128: Your Questions, Steve’s Answers 33. Listen

jeremiahgrossman.blogspot.com
Top Ten Web Hacks of 2007 (Official). Read more

 

Vulnerabilities & Exploits
securitytracker.com
Move Media Player Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
ICU Regular Expression Processing Bug May Let Users Execute Arbitrary Code. Read more

securitytracker.com
Web Wiz NewsPad Input Validation Flaw in 'FolderName' Parameter Lets Remote Users Traverse the Directory. Read more

securitytracker.com
Web Wiz Rich Text Editor Input Validation Flaw Lets Remote Users Traverse the Directory and Create HTML Files. Read more

securitytracker.com
Web Wiz Forums Input Validation Flaw in 'FolderName' Parameter Lets Remote Users Traverse the Directory. Read more

securitytracker.com
AIX 'ps' Command Discloses Process Environment Variables to Local Users. Read more

securitytracker.com
AIX Buffer Overflow in pioout Lets Local Users Gain Elevated Privileges. Read more

 

Tools:
sqlninja.sourceforge.net
SQLninja - SQL Injection Toolkit. Read more

 

News
www.securityfocus.com
Antivirus firms, test labs to form standards group. Read more

www.theregister.co.uk
Growing virus production taxes security firms. Read more

www.computerworld.com
Hackers hit Scientology with online attack. Read more

www.darkreading.com
Attackers Abuse Google Blogger. Read more

www.computerworld.com
Spammers cloak scams by redirecting through Google services. Read more

blog.wired.com
War Breaks Out Between Hackers and Scientology -- There Can Be Only One. Read more

asert.arbornetworks.com
Church of Scientology DDoS Statistics. Read more

www.computeractive.co.uk
Police address the growing threat of e-crime. Read more

www.theregister.co.uk
Virus writers charged with copyright violation. Read more

www.news.com
Greece arrests man suspected of major data hacks. Read more

www.theregister.co.uk
Sun Java update creaks under weight of bug fixes. Read more

www.informationweek.com
Societe Generale's 'Hacker' Trader Had Only Limited Computer Skills. Read more

www.vnunet.com
First hacker convicted for Estonia attacks. Read more

www.theregister.co.uk
Best Buy 'framed' by pesky Windows virus. Read more

www.theregister.co.uk
Malware authors target Mac emerging markets. Read more

www.msnbc.msn.com
Retired police chief, 69, nabs online predators. Read more

24 January 2008

Guides, Papers, etc
isc.sans.org
Drive-by Pharming and attacks against network infrastructure. Read more

isc.sans.org
Two New Cisco Vulnerabilities. Read more

rbnexploit.blogspot.com
RBN – Out with the New and in with the Old – Mebro... Read more

www.schneier.com
Hacking Power Networks. Read more

www.eweek.com
My Address Is None.Of.Your.Business. Read more

ddanchev.blogspot.com
Mujahideen Secrets 2 Encryption Tool Released. Read more

ddanchev.blogspot.com
E-crime and Socioeconomic Factors. Read more

www.avertlabs.com
Anti-Virus Testing 2.0. Read more

www.avertlabs.com
Pics from a friend? Maybe not. Read more

sunbeltblog.blogspot.com
Latest antivirus test results from Andreas Marx in XLS format. Read more

sunbeltblog.blogspot.com
Latest antivirus test results from Andreas Marx. Read more

sunbeltblog.blogspot.com
Best Security, Privacy and Data Protection Articles of 2007. Read more

www.vitalsecurity.org
Avoid this fake "Myspace program". Read more

blog.trendmicro.com
Symbian Malware Gives Love (and Beauty, and Sex) a Bad Name. Read more

www.securityfocus.com
Mother, May I? Read more

www.computerweekly.com
Open University starts computer forensics course. Read more

news.netcraft.com
Mr-Brain: Stealing Phish from Fraudsters. Read more

www.0x000000.com
Writing A Modular Universal XSS Worm. Read more

 

Vulnerabilities & Exploits
securitytracker.com
Cisco PIX Firewall TTL Decrement Feature Lets Remote Users Deny Service. Read more

securitytracker.com
Cisco ASA TTL Decrement Feature Lets Remote Users Deny Service. Read more

securitytracker.com
HP-UX ARPA Transport Bug Lets Remote Users Deny Service. Read more

securitytracker.com
Cisco Application Velocity System Default Password Lets Remote Users Access the System. Read more

securitytracker.com
Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
MyBB Input Validation Flaw in 'private.php' Lets Remote Users Inject SQL Commands. Read more

securitytracker.com
Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
Citadel Buffer Overflow in SMTP Service Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
IBM WebSphere Bug in PropFilePasswordEncoder Utility Has Unspecified Impact. Read more

securitytracker.com
IBM WebSphere Business Modeler Lets Remote Authenticated Users Delete Repository Objects. Read more

securitytracker.com
IBM WebSphere Bug in serveServletsByClassnameEnabled Feature Has Unspecified Impact. Read more

securitytracker.com
IBM Tivoli Business Service Manager Discloses Passwords to Local Users. Read more

securitytracker.com
IBM Tivoli Provisioning Manager for OS Deployment Lets Remote Users Deny Service. Read more

 

News
www.securityfocus.com
Attackers favor compromise over creation. Read more

www.channelregister.co.uk
A namedropping MSN Trojan is doing the rounds through MSN Messenger. Read more

www.theregister.co.uk
Hacked embassy websites found pushing malware. Read more

www.itnews.com.au
'Heath Ledger' search results lead to malicious sites. Read more

www.computerworlduk.com
Mozilla security chief warns of new Firefox flaw. Read more

www.technewsworld.com
Ground Shakes Beneath Google as EC Debates IP Privacy. Read more

www.theregister.co.uk
Spotted in the wild: Home router attack serves up counterfeit pages. Read more

www.theregister.co.uk
EU debates privacy of IP numbers. Read more

www.itnews.com.au
China breaks "real-time" Internet porn site. Read more

blog.wired.com
Reiser Prosecution Wobbles Under Police Forensics Gaffe -- Update. Read more

21 January 2008

Guides, Papers, etc
www.f-secure.com
One Year Ago...Read more

www.f-secure.com
Video - Mac DNS Changer Trojan. Read more

isc.sans.org
Not so boring night.... Read more

isc.sans.org
Industrial Control System Attacks. Read more

www.cisrt.org
Agent.hra, New Pushdo Variant. Read more

www.darkreading.com
Tech Insight: Incident Response. Read more

www.darkreading.com
Los Alamos Labs Vets Launch Forensics Company. Read more

www.darkreading.com
Catbird Nips Bugs In Virtualized Networks. Read more

www.darkreading.com
A 'Swift' Kick to the Secure Development Process. Read more

www.darkreading.com
Internet 'Skinny-Dipping'. Read more

www.eweek.com
ICANN Kill Two Birds with One Stone. Read more

www.securityfocus.com
I am as Good as Dead. Read more

sunbeltblog.blogspot.com
Securing WordPress. Read more

www.computerworld.com
'Hacker Safe' seal: Web site shield, or target? Read more

blog.trendmicro.com
SCADA Watch: Things You Probably Wish You Didn’t Know. Read more

holisticinfosec.blogspot.com
XSS and PCI: Not compliant, or Hacker Safe. Read more

www.vitalsecurity.org
How to give a wannabe hacker a very bad day. Read more

www.gnucitizen.org
Call Jacking: Phreaking the BT Home Hub. Read more

 

Vulnerabilities & Exploits
skype.com:
SKYPE-SB/2008-001: Skype Cross Zone Scripting Vulnerability. Read more

www.hiredhacker.com
Firefox chrome: URL Handling Directory Traversal. Read more

securitytracker.com
CORE FORCE Buffer Overflows and Input Validation Flaws Let Local Users Gain Elevated Privileges. Read more

securitytracker.com
Cisco VPN Client IOCTL Memory Corruption Error Lets Local Users Deny Service. Read more

securitytracker.com
Crystal Reports Buffer Overflow in 'EnterpriseControls.dll' ActiveX Control Lets Remote Users Deny Service. Read more

securitytracker.com
Pixelpost Input Validation Flaw in 'parent_id' Parameter Lets Remote Users Inject SQL Commands. Read more

securitytracker.com
Informix onedcu and sqlidebug File Creation Flaws Have Unspecified Impact. Read more

 

News
www.theregister.co.uk
Home Sec in anti-terror plan to control entire web. Read more

www.scmagazineus.com
China has penetrated key U.S. databases: SANS director. Read more

www.aviationweek.com
Military Hackers Turn To Commercial Electronic Attack Tools. Read more

torrentfreak.com
RIAA Website Wiped Clean by “Hackers”. Read more

www.theregister.co.uk
Storm Worm turns one. Read more

www.snpx.com
Mexico and Africa to become malware hotspots. Read more

www.pcadvisor.co.uk
Yahoo Mail hacked by Russian researcher. Read more

blog.wired.com
CIA: Hackers Shook Up Power Grids (Updated). Read more

www.siliconvalley.com
CIA: Hackers demanding cash disrupted power utilities overseas. Read more

www.theregister.co.uk
Perl.com sends visitors to porn link farm. Read more

securityblog.itproportal.com
Say hello to the E-Victims Web site. Read more

economictimes.indiatimes.com
IP address can mislead in online crime. Read more

18 January 2008

Guides, Papers, etc
www.f-secure.com
MacSweeper Responds. Read more

www.f-secure.com
Storm watching our every move? Read more

www.f-secure.com
From Storm With Love! Read more

www.f-secure.com
First Rogue Cleaning Tool for Mac. Read more

isc.sans.org
More about mass web infections. Read more

isc.sans.org
Large scale recovery. Read more

isc.sans.org
Shorts - other things happening this week. Read more

isc.sans.org
Deja Vu: Valentine's Storm. Read more

ddanchev.blogspot.com
DIY Fake MSN Client Stealing Passwords. Read more

ddanchev.blogspot.com
Storm Worm's St. Valentine Campaign. Read more

ddanchev.blogspot.com
The Random JS Malware Exploitation Kit. Read more

ddanchev.blogspot.com
RBN's Fake Account Suspended Notices. Read more

www.darkreading.com
Attackers Use New 'Call-Home' Method to Infiltrate Home Networks. Read more

www.darkreading.com
Malware Quietly Reaching 'Epidemic' Levels. Read more

www.darkreading.com
Expert: Mac Users Should Gird for Swell of Attacks. Read more

www.darkreading.com
Who Invented the Firewall? Read more

sunbeltblog.blogspot.com
"Infinity and Sons" racket. Read more

sunbeltblog.blogspot.com
Payment processor for pay-by-phone Trojan responds. Read more

sunbeltblog.blogspot.com
Head-scratcher: DNS zone transfers now illegal in North Dakota? Read more

sunbeltblog.blogspot.com
New rogue antispyware app: AntispyBoss. Read more

sunbeltblog.blogspot.com
Scam sites. Read more

www.dslreports.com
Ebook websites, fraud charges, Devbill/DigitalAge/Pluto. Read more

billpstudios.blogspot.com
Would you like Toolbar with your Software Order? Read more

www.wirelessdevnet.com
F-Secure Experts Map Out Future Malware Creation Hotspots. Read more

ha.ckers.org
Okay to Spam, Bad to Fight it in South Dakota. Read more

www.computerdefense.org
Port Scanner Challenge: And the Winner is? Read more

www.cisrt.org
Three Phishing Sites about Chinese Bank. Read more

blog.trendmicro.com
Network Security 101: Learn From The Past. Read more

holisticinfosec.blogspot.com
Hacker Safe? Not so much. Read more

www.eweek.com
Who Wants to Pay Twice for the Same Software? Read more

www.detnews.com
Lawsuit questions password rights. Read more

blog.washingtonpost.com
Wishing an (Un)Happy Birthday to the Storm Worm. Read more

blogs.cisco.com
Where have all the viruses gone? Read more

www.infoworld.com
Internet security: What will work. Read more

www.pandasecurity.com
Annual Report Pandalabs 2007. Read more.

www.pandasecurity.com
MPack uncovered! Read more

www.pandasecurity.com
IcePack uncovered. Read more

aolradio.podcast.aol.com
Audio. Security Now 127: Securing The Enterprise. Listen

www.bbc.co.uk
Audio. Simon Cox tries to track down the criminals who plague us with spam emails offering everything from get rich schemes to products to improve our sex lives. The hunt takes him from Europe to America and Asia and finally to New Zealand. Read more

 

Vulnerabilities & Exploits
Microsoft Security Advisory (947563)
Vulnerability in Microsoft Excel Could Allow Remote Code Execution. Read more

aviv.raffon.net
Skype cross-zone scripting vulnerability. Read more

securitytracker.com
X Server Bugs in XFree86, Xinput, TOG-CUP, MIT-SHM, and EVI Extensions Let Local Users Gain Root Privileges. Read more

securitytracker.com
Citrix Presentation Server Buffer Overflow in IMA Service Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Lotus Sametime Input Validation Hole in Chat Client Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
Cisco Unified Communications Manager Buffer Overflow in Certificate Trust List Provider Service Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Hosting Controller Multiple Bugs Let Remote Users Gain Administrative Access. Read more

securitytracker.com
QuickTime Movie and PICT File Processing Bugs Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Apple iPhone URL Processing Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Apple iPhone Lets Physically Local Users Bypass the Passcode Lock. Read more

securitytracker.com
Oracle Database and Other Products Have Unspecified Vulnerabilities With Unspecified Impact. Read more

securitytracker.com
Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Apache Input Validation Hole in Mod_AutoIndex When the Character Set is Undefined May Permit Cross-Site Scripting Attacks. Read more

securitytracker.com
TIBCO SmartSockets Untrusted Pointer and Pointer Offset Values and Buffer Overflows Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com
FreeBSD pty May Disclose Information to Local Users. Read more

securitytracker.com
BIG-IP Input Validation Hole in SearchString Parameter Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
FreeBSD libc Buffer Overflow in inet_network() May Let Users Deny Service or Execute Arbitrary Code. Read more

 

Tools:
www.computec.ch
httprecon is a tool for advanced web server fingerprinting, likely to increase web server probes as the tool is examined and included into other tools. Read more

www.darknet.org.uk
sqlmap 0.5 - Automated SQL Injection Tool. Read more

 

News
www.securityfocus.com
Targeted attack exploits zero-day Excel flaw. Read more

www.theregister.co.uk
Hackers go after Excel. Read more

www.channelregister.co.uk
Mystery web infection grows, but cause remains elusive. Read more

www.channelregister.co.uk
Online crime gangs embrace open source ethos. Read more

www.techworld.com
Fears as Windows attack code is released. Read more

today.reuters.co.uk
Ways sought to combat militants on Web. Read more

www.informationweek.com
Many 'Hacker Safe' Web Sites Found Vulnerable. Read more

www.asahi.com
Asia: 'Internet forces' in China and Taiwan step up cyber attacks. Read more

www.wired.com
MySpace Bug Leaks 'Private' Teen Photos to Voyeurs. Read more

www.fcw.com
Foreign hackers seek to steal Americans' health records. Read more

www.theregister.co.uk
Anti-spammer fined $60K for DNS lookup 'hack'. Read more

www.info4security.com
Microsoft "planning spy software for offices". Read more

www.washingtonpost.com
In Child Porn Case, a Digital Dilemma. Read more

www.news.com
Child porn defendant locked up after ZIP file encryption broken. Read more

www.channelregister.co.uk
Face of Mankind DoS teen perp reprimanded. Read more

www.channelregister.co.uk
British software pirate faces up to 10 years in jail. Read more

www2.csoonline.com
Computerworld: Ikea Closes Global Spam Gap. Read more

www.infoworld.com
With trials beginning, another Estonia cyberattack. Read more

www.theregister.co.uk
Online gamer murders rival clan member. Read more

www.informationweek.com
Yahoo's CAPTCHA Security Reportedly Broken. Read more

www.theregister.co.uk
2008 - the year VoIP gets hacked? Read more

15 January 2008

Guides, Papers, etc
honeynet.org.es
HoneySpot: The Wireless Honeypot. Read more

www.schneier.com
Crypto-Gram Newsletter. January 15, 2008. Read more

www.portfolio.com
The Pirates Can't Be Stopped. Read more

www.f-secure.com
First Rogue Cleaning Tool for Mac. Read more

isc.sans.org
Targeted attacks: behind the media reports. Read more

isc.sans.org
Mass Web Infections. Read more

blog.spywareguide.com
Myspace Prank Relocates You To Japan. Read more

ddanchev.blogspot.com
PAINTing a Botnet IRC Channel. Read more

ddanchev.blogspot.com
The Pseudo "Real Players". Read more

www.darkreading.com
IRS Still Hasn't Fixed Security Problems. Read more

www.daemon.be
Targeted Attacks. Read more

www.daemon.be/maarten
Crouching Powerpoint Hidden Trojan. Read more

antirootkit.com
Nailuj Rootkit Analysis. Read more

 

Vulnerabilities & Exploits
securitytracker.com
OpenBSD rtlabel_id2name() NULL Return Value Lets Local Users Deny Service. Read more

securitytracker.com
Solaris libdevinfo Access Control Flaw Lets Local Users Access Files to Gain Elevated Privileges. Read more

securitytracker.com
Solaris dotoprocs() Function Lets Local Users Deny Service. Read more

 

Tools:
www.antirootkit.com
Anti Rootkit Software Scanners for Vista. Read more

fileforum.betanews.com
Damn Small Linux 4.2.4. Read more

 

News
www.computerworld.com
New mass hack strikes sites, confounds researchers. Read more

www.securitypark.co.uk
10,000 trusted domains infected by crimeware Trojan. Read more

www.eweek.com
New MSN Messenger Trojan Spreading Quickly. Read more

www.computerworld.com
Another new Trojan intercepts online banking information. Read more

www.theregister.co.uk
Browser vulns and botnets head threat list. Read more

www.channelregister.co.uk
Most home routers 'vulnerable to remote take-over'. Read more

www.usdoj.gov
Foreign National Pleads Guilty in Complex Computer Fraud Scheme Victimizing Hundreds of Individuals. Read more

blog.wired.com
Convicted Hacker Charged With Extortion After Attack On Model's MySpace Account. Read more

www.theregister.co.uk
MySpace reveals child predator blocks. Read more

14 January 2008

Guides, Papers, etc
www.benedelman.org
Sears Exposes Customer Purchase History in Violation of Its Privacy Policy. Read more

anti-virus-rants.blogspot.com
vulnerability research vs. malware research. Read more

www.f-secure.com
Have you seen this man? Read more

blog.trendmicro.com
E-commerce Sites Invaded. Read more

www.cisrt.org
New Variant of Trojan.Pushdo. Read more

swatrant.blogspot.com
MalwareCrush Fake Security Center. Read more

news.zdnet.co.uk
Browser features may pose hacking threat. Read more

www.infoworld.com
Security design: Why UAC will not work. Read more

www.computerweekly.com
How to combat the Sans Institute's top 10 security threats. Read more

www.washingtonpost.com
Identity Theft Gets Personal. Read more

www.technewsworld.com
Weekly Recap: Gates' CES Swan Song, Intel Investigated, 'Spam King' Dethroned. Read more

www.gnucitizen.org
Hacking The Interwebs. Read more

www.gnucitizen.org
Steal His Wi-Fi. Read more

ha.ckers.org
Moto Q9 DoS and Fingerprinting. Read more

 

Tools:
www.roxyp.info
Roxyp, bypass web filters. Read more

 

News
www.computerworld.com
'Hacker Safe' Web Site Suffers Security Breach. Read more

www.computerworld.com.au
Old exploit keeps on tickin' for hackers. Read more

12 January 2008

Guides, Papers, etc
www.eweek.com
NetSol Abuses the Process in Order to Save It. Read more

blogs.eweek.com
Network Solutions Frontrunning and Tasting, Version 1.1. Read more

www.crikey.com.au
Why government internet filtering won’t work. Read more

www.f-secure.com
This blog post contains the words "V6J" and "5C6". Read more

blog.trendmicro.com
Targeted Attack in Mexico: DNS Poisoning via Modems. Read more

www.cisrt.org
Apple QuickTime RTSP Reply Reason-Phrase Buffer Overflow. Read more

blog.spywareguide.com
MSN Worm Has A Passion For Luxury Watches. Read more

blog.trendmicro.com
Xbox Live Accounts Hacked. Read more

blog.trendmicro.com
Fake RootkitBuster Busted! Read more

blog.trendmicro.com
Fake IRS Websites Found (Again). Read more

isc.sans.org
Patchlink Issue. Read more

isc.sans.org
Java.ByteVerify exploit. Read more

sunbeltblog.blogspot.com
How incredibly sick -- targeting small non-profits. Read more

sunbeltblog.blogspot.com
New fake codec site -- Windows and Mac -- codeczang. Read more

sunbeltblog.blogspot.com
Beware Barbara Moratek of the Ivete Foundation. Read more

www.prevx.com
New Botnet - With Pictures - Enjoy! Read more

www.shadowserver.org
RBN AS RBusiness Network. Clarifying the “guesswork” of Criminal Activity. Read more

www.symantec.com
The State of Spam. A Monthly Report – January 2008. Read more

honeyblog.org
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Read more

blogs.technet.com
VBootkit vs. Bitlocker in TPM mode. Read more

www.youtube.com
Video. The New Face of Cybercrime. Watch

www.youtube.com
Video. Online Gaming and Criminality. Watch

www.youtube.com
Video. Exploiting Online Games: Virtual World Security-Greg Hoglund. Watch

aolradio.podcast.aol.com
Audio. Security Now 126: Listener Feedback 32. Listen

www.disog.org
Audio. Honeypot Overview Audiocast. Listen

resources.zdnet.co.uk
Anatomy of a hack attack. Read more

www.darkreading.com
Spammers Abuse Online Storage, File-Sharing Services. Read more

www.darkreading.com
How to Make Vulnerability Scans Pay Off. Read more

www.darkreading.com
Botnets: Computer Crime's Service Providers. Read more

www.darkreading.com
Hacking & the Academy Awards. Read more

www.newcriminologist.com
Cybercrime going Upscale? Read more

www.webpronews.com
Google Hacking Not Fun For You. Read more

www.eweek.com
Reforming the DisGrace Period. Read more

www.wired.com
DRM Is Dead, But Watermarks Rise From Its Ashes. Read more

www.microsoft.com
Internet Explorer 7 Deployment Guide. Read more

www.informit.com
How Vista Makes Home Networking Better. Read more

www.inteldaily.com
For years US eavesdroppers could read encrypted messages without the least difficulty. Read more

www.cwnp.com
Certified Wireless Analysis ProfessionalOfficial Study Guide. Read more

www.joelesler.ne
Skype, is it right for you? Let's take a look. Read more

 

Vulnerabilities & Exploits
securitytracker.com
QuickTime Buffer Overflow in Processing HTTP 404 Response Messages Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
IBM Tivoli Storage Manager Express Server Heap Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Libxml2 UTF-8 Validation Flaw Lets Remote Users Deny Service. Read more

securitytracker.com
Ingate SIParator Lets Remote Users Consume All Available SIP Media Ports. Read more

securitytracker.com
Ingate Firewall Lets Remote Users Consume All Available SIP Media Ports. Read more

securitytracker.com
Sun Java System Identity Manager Input Validation Hole Permits Cross-Site Scripting Attacks. Read more

securitytracker.com
IBM WebSphere Bug in Administrative Console Has Unspecified Impact. Read more

securitytracker.com
AOL Buffer Overflow in AOLMediaPlaybackControl ActiveX Control Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
NetWare 'nicm.sys' Driver Lets Local Users Gain Kernel Level Privileges. Read more

securitytracker.com
MaxDB 'cons.exe' Lets Remote Users Execute Arbitrary Commands on the Target System. Read more

securitytracker.com
McAfee E-Business Server Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
www.trendsecure.com
Trend Micro RUBotted (Beta) is a small program that runs on your computer, watching for bot related activities. RUBotted intelligently monitors your computer's system behavior for activities that are potentially harmful to both your computer and other people's computers. Read more

 

News
blog.domaintools.com
Network Solutions steals domain ideas; Confirmed! Read more

news.wired.com
New Domain Name Practice Criticized. Read more

www.theregister.co.uk
Polish teen derails tram after hacking train network. Read more

www.theregister.co.uk
Mass web infection leaves researcher scratching her head. Read more

www.theregister.co.uk
MP3sparks.com downed by links to Russian cybercrime gang. Read more

www.vnunet.com
Botnet threat set to get worse. Read more

www.recordonline.com
Cybersleuthing holds up in test case of pedophile. Read more

www.theregister.co.uk
Poisoned MySpace page masquerades as Windows Update. Read more

www.msnbc.msn.com
Security breach worries online porn world. Read more

atlanta.bizjournals.com
Former Cox Communications worker sentenced to prison. Read more

www.wired.com
Reiser Murder Trial Resumes — Images From the Courthouse So Far. Read more

www.technewsworld.com
Legal Focus Shifts to Fraud in MySpace Suicide Case. Read more

10 January 2008

Guides, Papers, etc
www.f-secure.com
First New Year Patch for 2008. Read more

www.theregister.co.uk
Excuse me sir: there's a rootkit in your master boot record. Read more

blogs.securiteam.com
MBR rootkit - here’s some references. Read more

resources.zdnet.co.uk
Anatomy of a hack attack. Read more

www.computerworld.com
Nugache worm kicking up a botnet Storm. Read more

sunbeltblog.blogspot.com
On that MBR rootkit. Read more

sunbeltblog.blogspot.com
Redirects and poor security. Read more

sunbeltblog.blogspot.com
New fake codec sites -- Mac and Windows. Read more

ddanchev.blogspot.com
Malware Serving Exploits Embedded Sites as Usual. Read more

ddanchev.blogspot.com
The Invisible Blackhat SEO Campaign. Read more

ddanchev.blogspot.com
MySpace Phishers Now Targeting Facebook. Read more

ddanchev.blogspot.com
Massive RealPlayer Exploit Embedded Attack. Read more

www.wired.com
Steal This Wi-Fi. Read more

auren.vortex.com
Internet Content Filtering -- and the Wicked Witch Rises. Read more

www.darkreading.com
Storm Botnet Turned Toward Phishing Attacks. Read more

www.darkreading.com
DDOS Botnets Thriving, Threatening. Read more

www.darkreading.com
Competition May Be Driving Surge in Botnets, Spam. Read more

blogs.securiteam.com
Google as an RBL. Read more

www.f-secure.com
Phishing from the Storm Botnet. Read more

www.f-secure.com
Trojan Software for iPhone. Read more

isc.sans.org
Profiling your network in advance of MS08-001 exploit attempts. Read more

isc.sans.org
January Black Tuesday overview. Read more

www.eweek.com
Phishing at the Top Level. Read more

www.eweek.com
Sears Unapologetic on Spyware. Read more

www.eweek.com
Sears' Christmas Spyware Surprise. Read more

www.networkworld.com
To catch a hacker. Read more

explabs.blogspot.com
So this is kind of interesting... Read more

blogs.securiteam.com
Facebook’s My Admirer is gone - and was there spyware at all? Read more

 

Vulnerabilities & Exploits
securitytracker.com
Ichitaro Buffer Overflow in Processing jtd Files Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
SSH Tectia Lets Local Users Gain Root Privileges. Read more

securitytracker.com
Windows TCP/IP Stack ICMP and IGMP Bugs Let Remote Users Deny Service and Execute Arbitrary Code. Read more

securitytracker.com
Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges. Read more

securitytracker.com
LevelOne WBR-3460A Wireless Router Grants Management Access to Remote Users. Read more

securitytracker.com
netOctopus 'nantsys.sys' Driver Lets Local Users Gain Kernel Level Privileges. Read more

securitytracker.com
OpenPegasus Stack Overflow in PAM Authentication Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
IBM AIX Trusted Execution Bug Has Unspecified Impact. Read more

securitytracker.com
PostgreSQL Bugs Let Remote Authenticated Users Deny Service and Obtain Elevated Privileges. Read more

www.securiteam.com
Linksys WRT54 GL Session Riding (CSRF). Read more

 

News
www.theregister.co.uk
Microsoft plugs 'critical' hole in Vista. Read more

www.securityfocus.com
Microsoft closes a critical network flaw. Read more

www.computerworld.com
Mass hack infects tens of thousands of sites. Read more

www.vnunet.com
Storm botnet connected to phishing ring. Read more

www.securityfocus.com
Malware hitches a ride on digital devices. Read more

www.informationweek.com
Zango Denies Involvement With Facebook Malware.Read more

www.computerworld.com
Medco sys admin gets 30 months for planting logic bomb. Read more

www.vnunet.com
Pre-teen creates iPhone malware. Read more

www.miamiherald.com
Hacker made vacancies in hotel guests' accounts. Read more

www.securityfocus.com
Web tools create XSS headaches. Read more

www.theregister.co.uk
German hackers fight electronic voting. Read more

www.informationweek.com
Phony iPhone Upgrade Hides Malware. Read more

07 January 2008

Guides, Papers, etc
www.bizeul.org
Russian Business Network study. Read more

rbnexploit.blogspot.com
RBN - Storm Botnet, the Changing Chessboard. Read more

www.enterprisenetworkingplanet.com
The Botnet Ecosystem: What's the Point? Read more

www.mtv.com
'Untraceable' Cyber Criminals? Former FBI Agent Says There's No Such Thing. Read more

www.avertlabs.com
W32/Kibik.b – Seeking Them Out From Your Codecs and Winlogon.Exe. Read more

blogs.securiteam.com
Wi-Fi-Flu? Read more

blogs.securiteam.com
Wi-Fi in Brazil: Be a Ninja. Read more

isc.sans.org
Digital Hitchhikers Part Three. Read

isc.sans.org
Tools for the Home User. Read more

sunbeltblog.blogspot.com
Stu's 2008 predictions. Read more

sunbeltblog.blogspot.com
Heads-up: RealPlayer Zero Day. Read more

ha.ckers.org
Diminutive XSS Worm Contest Drama and Status Update. Read more

www.prevx.com
Master Boot Record Rootkit is here and ITW. Read more

www2.gmer.net
Stealth MBR rootkit. Read more

blog.spywareguide.com
Myspace: What Happened Here? Read more

blog.trendmicro.com
MySpace, Excite, and Blick Serve Up Malicious Banner Ads. Read more

lauren.vortex.com
Would You Know if Your ISP Tampered With Your Web Pages? Read more

www.microsoft.com
Inside the Windows Vista Kernel: Part 1. Read more

www.microsoft.com
Inside the Windows Vista Kernel: Part 2. Read more

www.microsoft.com
Inside the Windows Vista Kernel: Part 3. Read more

www.veoh.com
Video. In Action: ILoveYou Worm. Watch

www.veoh.com
Video. In Action: Sasser Worm. Watch

explabs.blogspot.com
Neosploit January 2008. Read more

www.darkreading.com
Tech Insight: Database Activity Monitoring. Read more

www.darkreading.com
'Go-To' Sites for Threat Updates. Read more

www.darkreading.com
Laying Down the Law. Read more

 

Vulnerabilities & Exploits
securitytracker.com
RealPlayer Buffer Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Novell ZENworks Unsafe Executable Path Lets Local Users Gain System Privileges. Read more

securitytracker.com
Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks. Read more

 

Tools:
technet.microsoft.com
The Sysinternals Troubleshooting Utilities. Read more

 

News
www.pcworld.com
Malware Writers Hack CA's Site. Read more

www.securityfocus.com
Microsoft predicts more phishing, e-greeting scams. Read more

www.zdnet.com.au
South Korean army on alert over foreign hackers. Read more

www.foxnews.com
Hackers Force Pennsylvania's Government Web Site to Shut Down for Hours. Read more

www.680news.com
Computer hacker attacks Durham Police website. Read more

www.theregister.co.uk
Camouflaged code threatens security apps. Read more

www.theregister.co.uk
Firefox spoofing bug raises phishing fears. Read more

www.channelregister.co.uk
'Ragtag' Russian army shows the new face of DDoS attacks. Read more

www.orlandosentinel.com
Laptop doesn't need password, uses face recognition. Read more

news.bbc.co.uk
Clarkson stung after bank prank. Read more

04 January 2008

Guides, Papers, etc
blogs.technet.com
The Case of the Missing AutoPlay. Read more

www.computerworld.com
Anti-botnet vendors (botreupreneurs?) plug into demand. Read more

news.netcraft.com
Phishing kits take advantage of novice fraudsters. Read more

sunbeltblog.blogspot.com
Malicious ads on Myspace, Excite, Blick. Read more

sunbeltblog.blogspot.com
Correction on STOPzilla post (and is a horse a horse, regardless of the color?) Read more

www.f-secure.com
Phish(Face)book! Read more

www.f-secure.com
Hupigon and On and On. Read more

www.fortiguardcenter.com
Facebook Widget Installing Spyware. Read more

isc.sans.org
Realplayer Vulnerability. Read more

isc.sans.org
McAfee falsing on some JavaScripts. Read more

msmvps.com
Has Sears joined the dark side again? Read more

blog.trendmicro.com
A Spear in My Heart: Jets Fan Sites Compromised. Read more

blog.trendmicro.com
Holiday Tally: Storm Social-Engineering Manages a >200% Increase in Size. Read more

blog.trendmicro.com
Nintendo Wii Hacked. Read more

honeyblog.org
Measuring the Success Rate of Storm Worm. Read more

www.avertlabs.com
Bad boy or Good boy’s tool? Read more

blogs.securiteam.com
My name is Zango, I am spyware and I found Facebook applications. Read more

www.eweek.com
More Bad Drivers on the Information Superhighway. Read more

www.darkreading.com
Urban WiFi Routers at Risk. Read more

www.darkreading.com
The Perfect Jewelry Heist. Read more

www.channelregister.co.uk
Beware of pickpockets and malware-laced banner ads. Read more

www.usdoj.gov
Alan Ralsky, Ten Others, Indicted In International Illegal Spamming And Stock Fraud Scheme. Read more

www.baselinemag.com
Computer Forensics Faces Private Eye Competition. Read more

blogs.zdnet.com
2008: The security wishlist. Read more

today.reuters.co.u
Virtual PCs add new layer of security. Read more

education-portal.com
10 Sources for Free Computer Programming Courses Online. Read more

www.podtrac.com
Audio. Security Now 125: Symmetric Ciphers. Listen

 

Vulnerabilities & Exploits
securitytracker.com
Asterisk SIP Channel Driver Can Be Crashed By Remote Users With 'BYE with Also' Method. Read more

securitytracker.com
LiveCart Input Validation Hole Permits Cross-Site Scripting Attacks. Read more

aviv.raffon.net
Yet another Dialog Spoofing - Firefox Basic Authentication. Read more

 

Tools:
www.mojopac.com
MojoPac is a technology that transforms your iPod or USB Hard Drive or Flash drive into a portable and private PC. Read more

 

News
www.pcpro.co.uk
Government attacked on hacker laws. Read more

www.techworld.com
Warning of flaw in latest RealPlayer. Read more

www.theregister.co.uk
RealPlayer users warned over unpatched vuln. Read more

www.securityfocus.com
Malware variants may have hit half-million mark. Read more

www.smh.com.au
Labor warned on porn filters. Read more

www.guardian.co.uk
... while Japanese face web censorship. Read more

www.wired.com
Fraudsters Target Facebook With Phishing Scam. Read more

www.vnunet.com
Microsoft kicks off 2008 with two patches. Read more

www.theregister.co.uk
'Ragtag' Russian army shows the new face of DDoS attacks. Read more

www.theregister.co.uk
Secret Crush widget spreads adware on Facebook. Read more

www.theregister.co.uk
Sears admits to joining spyware biz. Read more

www.washingtonpost.com
Researcher Accuses Sears of Spreading Spyware. Read more

www.computerworld.com
'Diehard' virus variants flexing muscle. Read more

www.securityfocus.com
Policy group warns over travel card. Read more

www.techworld.com
'Ransomware' demands payment to unlock PCs. Read more

news.softpedia.com
Windows Task Scheduler under Worm Attacks. Read more

www.computerworlduk.com
Virus could hit wireless LANs. Read more

www.theregister.co.uk
Office update disables MS files. Read more

www.itweb.co.za
Virtual PCs enhance security. Read more

www.berkeley.edu
SETI@home looking for more volunteers. Read more

02 January 2008

Guides, Papers, etc
www.benedelman.org
The Sears "Community" Installation of ComScore. Read more

community.ca.com
Sears.com: Join the Community – Get Spyware. Read more

www.symantec.com
Notes from the Underground. Read more

www.schneier.com
The Nugache Worm/Botnet. Read more

sunbeltblog.blogspot.com
Trojan delivers pay-by-phone extortion. Read more

sunbeltblog.blogspot.com
Where to submit malware samples. Read more

sunbeltblog.blogspot.com
And yet another security vendor succumbs to temptation. Read more

msmvps.com
MLB.COM users hijacked and redirected to pornographic web site, complete with graphic videos - DOUBLECLICK involved. Read more

www.darkreading.com
The Five Coolest Hacks of 2007. Read more

www.darkreading.com
Hackers Take the Holidays. Read more

www.darkreading.com
The Prank That Could Get You Dead. Read more

isc.sans.org
False Positives from CA's AV for certain Javascript apps. Read more

isc.sans.org
A little discussion on blog-hosted malware. Read more

www.viruslist.com
Virus Top 20 for December 2007. Read more

www.cisrt.org
New-Year2008-imgaes.zip & Happy2008.zip. Read more

blog.spywareguide.com
Laziest Spam Ever. Read more

www.0x000000.com
Interconnectivity. Read more

www.0x000000.com
Why Signature Detection Fails. Read more

www.teamfurry.com
Taking a look back. Read more

www.modsecurity.org
Detecting Credit Card Numbers in Network Traffic. Read more

ha.ckers.org
XSS on Whois. Read more

resources.zdnet.co.uk
Cracking open the cybercrime economy. Read more

www.datasecurity-event.com
2nd International CARO Workshop. Focus will be on the technical aspects and problems caused by Packers, Decryptors and Obfuscators in the broadest sense. Read more

 

Vulnerabilities & Exploits
securitytracker.com
Clam AntiVirus Off-by-one Bug in Processing MS-ZIP Compressed CAB Files Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
Clam AntiVirus bzip2 Vulnerability Has Unspecified Impact. Read more

securitytracker.com
Clam AntiVirus Unsafe File Access Lets Local Users Gain Elevated Privileges. Read more

securitytracker.com
XUpload Control Buffer Overflow in AddFolder() Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com
TYPO3 Input Validation Flaw in indexed_search Lets Remote Authenticated Users Inject SQL Commands. Read more

 

Tools:
www.runscanner.net
Runscanner : Freeware startup and hijack analyzer. Read more

 

News
www.securityfocus.com
Reported data leaks reach high in 2007. Read more

www.koreatimes.co.kr
Military Issues Warning on Chinese Hackers. Read more

www.jpost.com
Arab teen suspected of 'Internet terror'. Read more

www.israelnationalnews.com
Arab Israeli Arrested for Cyber-Sabotage of Israeli Websites. Read more

www.theregister.co.uk
Old school VXers calling it quits. Read more

www.computerworld.com
Malware evolving too fast for antivirus apps. Read more

www.australianit.news.com.au
Onus on users to "unfilter" websites. Read more

www.theregister.co.uk
US Army loads up on Apples for 'better security'. Read more

www.heise-security.co.uk
24C3: Barcode systems susceptible to serious hacker attacks. Read more

www.washingtonpost.com
Wikia Search Project to Launch Jan. 7, Wales says. Read more


Copyright© MegaSecurity.org