Home    News Archive    Translate Traducen
News March 2008
29 March 2008

Guides, Papers, etc
ddanchev.blogspot.com
Massive IFRAME SEO Poisoning Attack Continuing. Read more

isc.sans.org
Update on IFRAME SEO Poisoning. Read more

isc.sans.org
Guarding the guardians: a story of PGP key ring theft. Read more

isc.sans.org
Freedom of Speech...or not? Read more

isc.sans.org
Internet Storm Center Podcast. Read more

www.avertlabs.com
‘Targeted Attack’ Mania. Read more

msmvps.com
Java setup sucks... Read more

msmvps.com
Bucksbill.com overcharging victims of fraudware. Read more

msmvps.com
Forceup.com are distributing malicious advertisements .. again - an examination of the social engineering behind malvertisements. Read more

msmvps.com
Gemini Interactive caught distributing malvertizements. Read more

www.securityfocus.com
Laptops wait for attackers in hacking contest. Read more

www.securityfocus.com
Web developers, fix thy Flash. Read more

www.securityfocus.com
Mac OS X first to fall. Read more

www.f-secure.com
F-Secure goes to Black Hat 2008 in Amsterdam. Read more

www.informationweek.com
Why Did Vista Stink? Developers, Developers …Read more

www.computerworld.com
Analyst: Money will lead to more mobile spying programs. Read more

eng.cnews.ru
What is Russia's answer to cyber threats? Read more

blog.trendmicro.com
The Case of the Chinese Massive Text Spam. Read more

www.eweek.com
Defining Objectionable Content. Read more

blogs.msdn.com
Internet Explorer 8 and Adaptive Zoom. Read more

dvlabs.tippingpoint.com
PWN to OWN: Final Day (and another winner!). Read more

www.theregister.co.uk
Next time you go to the loo, bring your locked laptop with you. Read more

www.enterpriseitplanet.com
Smartphones: Pocketable Endpoints or Network Backdoor? Read more

www.informationweek.com
E-Mail In Peril. Read more

sipvicious.org
Blackhat Europe Briefings Day 1. Read more

www.podtrac.com
Audio. Security Now 137: RAM Hijacks. Listen

 

Tools:
release of Capture-HPC v2.1. Read more

 

News
www.computerworld.com
Hackers expand massive IFrame attack to prime sites. Read more

www.theregister.co.uk
Microsoft looks to fix bugs with desktop search. Read more

www.computerworld.com
Update: Microsoft admits it knew about, didn't patch, bugs. Read more

ap.google.com
Malware Cited in Supermarket Data Breach. Read more

www.informationweek.com
MacBook Air Hacked In Two Minutes. Read more

www.techworld.com
Facetime peers inside Skype encryption. Read more

www.aspentimes.com
Former Ski.com employee gets house arrest. Read more

www.vnunet.com
Emergency services hack lands man in prison. Read more

blog.seattlepi.nwsource.com
Microsoft unfazed by FTC's loss in porn spam case. Read more

www.wired.com
Hackers Assault Epilepsy Patients via Computer. Read more

www.sheboygan-press.com
Police: Little Chute teen used 'Dummies' book to hack school computers. Read more

www.networkcomputing.com
Malware brought Hannaford down! Read more

news.bbc.co.uk
Beijing investigates spam attack. Read more

26 March 2008

Guides, Papers, etc
www.f-secure.com
Targeted malware attacks against pro-Tibet groups. Read more

www.benedelman.org
Coupons.com and TRUSTe: Lots of Talk, Too Little Action. Read more

blog.trendmicro.com
New MBR Rootkit Variant: MBR Rootkit vs. Anti-rootkit. Read more

www.avertlabs.com
Exploring StealthMBR Defenses. Read more

ddanchev.blogspot.com
A Localized Bankers Malware Campaign. Read more

sunbeltblog.blogspot.com
Google adwords phishing. Read more

sunbeltblog.blogspot.com
Various new rogue antispyware programs. Read more

sunbeltblog.blogspot.com
Dumb 419 scam. Read more

sunbeltblog.blogspot.com
Uncomfirmed: Facebook accounts hacked to show sick images? Read more

garwarner.blogspot.com
Phishers Seek Google Adword Accounts. Read more

john.jubjubs.net
Apple Software Update. Read more

isc.sans.org
Next-generation Web browsers? Read more

www.eweek.com
Can You Trust TRUSTe? Read more

www.darkreading.com
A Vulnerability Scanner You Can't Do Without. Read more

blog.trendmicro.com
Ratings Manipulation Reaches eBay. Read more

www.computerworld.com
Windows XP: Going, going ... gone? Read more

nmap.org
Nmap In The Movies. Read more

www.theregister.co.uk
Of laptops and US border searches. Read more

 

Vulnerabilities & Exploits
securitytracker.com
Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents. Read more

www.securityfocus.com
Safari browser 3.1 (525.13) spoofing. Read more

 

Tools:
firekeeper.mozdev.org
Firekeeper is an Intrusion Detection and Prevention System for Firefox. Read more

 

News
www.washingtonpost.com
Cyber Attacks Target Pro-Tibet Groups. Read more

www.informationweek.com
Pro-Tibet Groups Targeted In Cyberspace. Read more

www.securityfocus.com
Microsoft warns of targeted Word attack. Read more

blog.spywareguide.com
Facebook Accounts Hijacked, Child Torture Pics Uploaded to Profile? Read more

www.darkreading.com
Intel Researching New Approach to Laptop Security. Read more

www.darkreading.com
US Treasury Department Adopts Dual-Factor Authentication. Read more

www.whitehatsec.com
WhiteHat Security’s Latest Website Security Statistics Report Shows that Nine out of Ten Public Websites are Still Vulnerable to Attack. Read more

www.securityfocus.com
Hacking contest highlights value of vulnerabilities. Read more

www.mirror.co.uk
Police ID fear after Met website is hacked. Read more

joongangdaily.joins.com
Hackers hold Mirae Asset¡¯s homepage for ransom. Read more

www.itnews.com.au
Google holders seek human rights, censorship review. Read more

www.vnunet.com
Man admits to unleashing anime Trojan. Read more

21 March 2008

Guides, Papers, etc
ddanchev.blogspot.com
Cybersquatting Security Vendors for Fraudulent Purposes. Read more

ddanchev.blogspot.com
A Portfolio of Fake Video Codecs. Read more

msmvps.com
Expedia France/Realmedia hosting malicious SWF featuring yourmusic.com. Read more

www.avertlabs.com
StealthMBR Rootkit Enhances Its Capabilities. Read more

www.f-secure.com
Formula 1 racing and computer security. Read more

blog.spywareguide.com
Easy Does It: Infection Files For All. Read more

www.0x000000.com
10.000 Sites JS Malware Source Code. Read more

blog.spywareguide.com
Hasdoneit.com - Don't Do It! Read more

blog.spywareguide.com
Myspace Shutdown Prank. Read more

www.viruslist.com
Malware Miscellany, February 2008. Read more

www.wired.com
Inside the Twisted Mind of the Security Professional. Read more

www.securityfocus.com
On the Border. Read more

ha.ckers.org
Click A Link, Go To Jail. Read moreRead more

www.theregister.co.uk
So what's the easiest box to hack - Vista, Ubuntu or OS X? Read more

blogs.securiteam.com
Why coding after a long drinking night is not a good idea. Read more

www.channelregister.co.uk
Vista SP1 downloaders bite back. Read more

www.techworld.com
Encryption - the 'cold boot' hack explained. Read more

www.gcn.com
New threat in from cold. Researchers discover that chilling memory chips can defeat disk encryption. Read more

www.darkreading.com
A Peek at Snort 3.0. Read more

www.darkreading.com
US Firms Brace for Cyber War. Read more

thisweekintech.com
Security Now 136: Listener Feedback 37. Read more

 

Vulnerabilities & Exploits
securitytracker.com
F-Secure Anti-Virus Unhandled Exception in Processing Archives Lets Remote Users Execute Arbitrary Code. Read more

www.channelregister.co.uk
Critical bugs bite Kerberos. Read more

isc.sans.org
Potential Vulnerability in Flash CS3 Professional, Flash Professional 8 and Flash Basic 8? Read more

 

News
www.news.com
FBI posts fake hyperlinks to snare child porn suspects. Read more

www.news.com
Microsoft scoops up rootkit finder Komoku. Read more

www.washingtonpost.com
FBI Opens Probe of China-Based Hackers. Read more

www.reuters.com
China publishes "blacklist" of video Web sites. Read more

www.theage.com.au
Infected Australian computers fetch top dollar. Read more

www.scmagazineus.com
Spammers use Google Calendar to relay messages. Read more

www.darkreading.com
Feds Get Guilty Plea From Operation Bot Roast. Read more

www.yomiuri.co.jp
Man admits creating Web virus, spreading via copyright footage. Read more

19 March 2008

Guides, Papers, etc
ddanchev.blogspot.com
Terror on the Internet - Conflict of Interest. Read more

ddanchev.blogspot.com
PR Storm - Mass iFRAME Injectable Attacks. Read more

dsonline.computer.org
Terror on the Internet: A Complex Issue, and Getting Harder. Read more

www.theregister.co.uk
Security researchers show how to hook phishers. Read more

www.f-secure.com
Digging the Archives for Case Carderplanet. Read more

ha.ckers.org
Yahoo Mail Gives Users Trojan Horses. Read more

isc.sans.org
In a world of encrypted traffic, where is the NIDS ? Read more

isc.sans.org
Unzip of Death? Read more

www.usatoday.com
Even seemingly reliable e-mail vulnerable to hackers. Read more

www.websense.com
MSNBC is latest victim in mass javascript injection. Read more

www.0x000000.com
Security In IE7 & IE8. Read more

www.0x000000.com
Buggiest Browser. Read more

addxorrol.blogspot.com
A short real-life story on why cryptography breaks. Read more

blog.trendmicro.com
New Spam Twist: Meeting Invitation Spam. Read more

cp80.com
Internet Zoning Initiative Technical Overview. Read more

www.forbes.com
How To Make Your Phone Untappable. Read more

drpaulcarter.com
PC Assembly Tutorial. Read more

tv.boingboing.net
How to hack RFID-enabled credit cards for $8. Read more

zeroq.kulando.de
Tales from a botnet. Read more

www.ee.oulu.fi
PROTOS Genome Test Suite c10-archive. Read more

www.sans.org
Webcasts. Ask The Expert Webcast: Malcode Analysis and Response: Proficiency vs. Complexity. Read more

 

Vulnerabilities & Exploits
www.f-secure.com
F-Secure Security Advisory FSC-2008-2. Read more

isc.sans.org
VMware updates resolve critical security issues (VMSA-2008-0005). Read more

 

News
www.businessweek.com
China Blacks Out Tibet News. Read more

www.boingboing.net
Google, China, and genocide: web censorship and Tibet. Read more

news.bbc.co.uk
Microsoft releases Vista update. Read more

www.computerworld.com
Apple issues mega-monster security update. Read more

www.redorbit.com
Hackers Now Targeting Apple Products More Frequently. Read more

www.news.com
Windows-based cash machines 'easily hacked'. Read more

www.news.com
Berners-Lee wary of unsolicited Web tracking--of any kind. Read more

www.securecomputing.net.au
Fake Google Calender meeting invitations used in new spam attack. Read more

blog.trendmicro.com
Another Robert Confesses to Cybercrime. Read more

www.silicon.com
Police forces lack e-crime expertise and resources. Read more

www.securityfocus.com
Conference sponsors second hacking contest. Read more

www.theregister.co.uk
Teachers cower in face of cyberbullies. Read more

17 March 2008

Guides, Papers, etc
isc.sans.org
The Other iframe attack. Read more

isc.sans.org
2117966.net-- mass ASP injection. Read more

isc.sans.org
Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines. Read more

isc.sans.org
MS08-014 causes subtle Excel calculation error. Read more

isc.sans.org
Botnet malware defense. Read more

www.f-secure.com
Digging the Archives for Case Carderplanet. Read more

www.f-secure.com
All Usenix Conference Proceeding Made Public. Read more

www.viruslist.com
Brazilian taxpayers attacked by Trojan. Read more

www.viruslist.com
TrojanGet infects Flashget users around the world. Read more

www.eweek.com
The Secret China-U.S. Hacking War. Read more

www.pajamadeen.com
Chinese Computer Products Have Identity Theft Malware. Read more

www.usatoday.com
Botnet scams are exploding. Read more

www.boingboing.net
Boing Boing's Guide to Defeating Censorware. Read more

www.icann.org
SSAC Advisory on Fast Flux Hosting and DNS. Read more

honeyblog.org
Detection and Mitigation of Fast-Flux Service Networks. Read more

pi1.informatik.uni-mannheim.de
Measuring and Detecting Fast-Flux Service Networks. Read more

www.mercatus.org
FACTS AND FIGURES ABOUT Sevenen YEARS OF HOMELAND SECURITY SPENDING. Read more

blogs.iss.net
Security Ergonomics. Read more

ha.ckers.org
Symbiotic Vs Parasitic Computing. Read more

www.mckeeth.org
Surviving a Laptop Search. Read more

aolradio.podcast.aol.com
Security Now 135: IronKey. Listen

www.usenix.org
Audio. Advanced Rootkits by Greg Hoglund. Listen

 

Vulnerabilities & Exploits
www.websense.com
Internet Explorer 8 - Security Features and Concerns. Read more

www.heise-online.co.uk
Possible vulnerability in TrueCrypt 5.1. Read more

 

News
www.yomiuri.co.jp
Antivirus software company falls victim--to virus attack. Read more

advocacy.globalvoicesonline.org
China: YouTube blocked yet again. Read more

www.breitbart.com
Airport Blocks Some Internet Sites. Read more

technology.newscientist.com
Iran's firewalls tightened ahead of election. Read more

www.dailytech.com
Cyber Tensions Flare Amongst U.S., Chinese Military. Read more

www.securityfocus.com
Phone "swatter" gets 30 months. Read more

www.theregister.co.uk
Russian serfs paid $3 a day to break CAPTCHAs. Read more

blog.washingtonpost.com
Ukrainian CyberCrime Boss Leads Political Party. Read more

www.vnunet.com
Researchers hack into pacemakers. Read more

www.theregister.co.uk
China has world's largest online population. Read more

arstechnica.com
Spam doesn't pay: man faces 26 year sentence for spamming. Read more

13 March 2008

Guides, Papers, etc
ddanchev.blogspot.com
Embedded Malware at Bloggies Awards Site. Read more

ddanchev.blogspot.com
More High Profile Sites IFRAME Injected. Read more

ddanchev.blogspot.com
Loads.cc's DDoS for Hire Service. Read more

ddanchev.blogspot.com
The New Media Malware Gang - Part Four. Read more

ddanchev.blogspot.com
Wired.com and History.com Getting RBN-ed. Read more

blogs.securiteam.com
State of targeted attacks - criminals exploiting Excel vuln during two months. Read more

www.darkreading.com
AV Still Weak on Rootkit Detection, Fixing Infections. Read more

www.darkreading.com
Off the Record... Or Not. Read more

www.darkreading.com
Phishme Schools Users. Read more

www.darkreading.com
When Bad Tech Leads to Worse Results. Read more

www.avertlabs.com
Another Mass Attack Underway. Read more

www.avertlabs.com
Social engineering tricks use Tibet to lure victims. Read more

www.f-secure.com
Dexter Union Inc. Read more

isc.sans.org
Botnet malware defense. Read more

isc.sans.org
Remote File Include spoof!? Read more

isc.sans.org
Pointsec Full Disk Encryption cracked. Read more

isc.sans.org
Don't use G-Archiver. Read more

isc.sans.org
MSIE 5 and 6 FTP vulnerability. Read more

isc.sans.org
March Black Tuesday Overview. Read more

isc.sans.org
Firewire in the limelight. Read more

isc.sans.org
Real player exploit made public. Read more

sunbeltblog.blogspot.com
March test results of Antivirus programs in. Read more

sunbeltblog.blogspot.com
Oops: Macvirus.org hosting porno malware fest. Read more

sunbeltblog.blogspot.com
Dangerous Loads.cc malware gang re-emerges. Read more

swatrant.blogspot.com
One more fake Flash Player! Read more

www.lightbluetouchpaper.org
The two faces of Privila. Read more

www.dhs.gov
Fact Sheet: Cyber Storm II: National Cyber Exercise. Read more

www.securityfocus.com
Catch Them If You Can. Read more

www.darkreading.com
FTP Hacking on the Rise. Read more

www.theregister.co.uk
Why I downgraded from Vista to XP. Read more

blogs.zdnet.com
PCI security standard endangers wireless LANs. Read more

epic.org
SpySoftware, Complaint, Request for Investigation, Injunction, and Other Relief. Read more

www.courant.com
Credit Card Companies Can Stop ID Fraud. Read more

blog.joelesler.net
Internet Zoning Initiative, and why it's stupid. Read more

www.prevx.com
Is Limited User Account enough? Not really... Read more

www.popularmechanics.com
Counterfeit Chips Raise Big Hacking, Terror Threats, Experts Say. Read more

technology.timesonline.co.uk
E-mail inventor: I didn't foresee spam. Read more

 

News
www.theregister.co.uk
Mass compromise powers massive drive-by download attack. Read more

www.theregister.co.uk
Unpatched RealPayer bug paves way for drive-by downloads. Read more

www.shanghaidaily.com
Chinese `hacker' denies CNN report. Read more

www.channelregister.co.uk
Rent-a-bot gang rises from the DDoS ashes. Read more

www.theregister.co.uk
Top security firm: Phorm is adware. Read more

blog.wired.com
GoDaddy Silences Police-Watchdog Site RateMyCop.com. Read more

www.securityfocus.com
SEO poisoning attacks growing. Read nore

www.securityfocus.com
U.S. kicks off second cyber war game. Read more

www.securityfocus.com
Microsoft patches a dozen Office flaws. Read more

blog.wired.com
'Swatter' Sentenced to 30 Months in Prison for Hostage Hoaxes. Read more

www.nytimes.com
A Heart Device Is Found Vulnerable to Hacker Attacks. Read more

10 March 2008

Guides, Papers, etc
www.dailytech.com
Chinese Hackers Take On the World with Ease. Read more

www.benedelman.org
Delaying Payment to Deter Online Advertising Fraud. Read more

isc.sans.org
Some interesting reading for a snowy Saturday. Read more

isc.sans.org
Odds. Read more

isc.sans.org
Fun with some code. Read more

ddanchev.blogspot.com
Injecting IFRAMEs by Abusing Input Validation. Read more

sunbeltblog.blogspot.com
Rash of new spam pushes malware disguised as screensavers. Read more

blog.trendmicro.com
Yet another Thai Site compromised by EU Malware Authors. Read more

www.darkreading.com
Surge of Phishing Kits Hits the Net. Read more

www.darkreading.com
Hacking: The New Child's Play? Read more

www.f-secure.com
From SMTP to HTTP to FTP. Read more

blog.trendmicro.com
404 toolkit used by Vundo creators. Read more

isc.sans.org
Branching targeted attack execution paths outside of the code. Read more

msmvps.com
Password theft - the potential dangers of shareware. Read more

www.thedarkvisitor.com
Chinese hacker Xiao Chen. Read more

www.sophos.com
29A virus-writing gang shuts down. Read more

www.infonegocio.com
The bright side of 29A. Read more

edition.cnn.com
Chinese hackers: No site is safe. Read more

blogs.technet.com
March 2008 Advance Notification. Read more

anti-virus-rants.blogspot.com
what is outside-the-box analysis? Read more

anti-virus-rants.blogspot.com
cold boot attack good for more than just full disk encryption. Read more

anti-virus-rants.blogspot.com
what is non-persistence? Read more

ha.ckers.org
Phishme.com Internal Communication. Read more

www.technewsworld.com
The Never-Ending Struggle for Malware Containment. Read more

blog.siteadvisor.com
Microsoft OneCare incorrectly tagging SiteAdvisor; Solution in progress. Read more

www.nytimes.com
Coming Soon: Nothing Between You and Your Machine. Read more

aolradio.podcast.aol.com
Audio. Security Now 134: Listener Feedback 36. Listen

 

News
www.securityfocus.com
Browser makers focus on beating malware. Read more

www.news.com.au
Award website hacked on eve of ceremony. Read more

www.securityfocus.com
NY police bust international fraud ring. Read more

www.theregister.co.uk
Infamous malware group calls it quits. Read more

www.securityfocus.com
Going, Going, Gone! Read more

software.silicon.com
eBay warns of Romanian phishing threat. Read more

www.adn.com
Sites with anti-fraud sign still flawed. Read more

www.usdoj.gov
KC MAN SENTENCED FOR COMPUTER HACKING. Read more

www.computeractive.co.uk
New Firefox browser blocks hacked websites. Read more

software.silicon.com
Russia overtakes China as king of malware producers. Read more

seattletimes.nwsource.com
Internet activity is tracked more than we realize. Read more

06 March 2008

Guides, Papers, etc
www.upi.com
Analysis: Chinese cyberattacks on experts. Read more

www.theatlantic.com
“The Connection Has Been Reset”. China’s Great Firewall is crude, slapdash, and surprisingly easy to breach. Here’s why it’s so effective anyway. Read more

www.smh.com.au
Attack of the plagiarising hacker. Read more

www.thedarkvisitor.com
Horton hears a (Chinese hacker) Hu. Read more

www.thedarkvisitor.com
Horton hears a (Chinese hacker) Hu…Part II. Or, want to buy a gun? Read more

ddanchev.blogspot.com
ZDNet Asia and TorrentReactor IFRAME-ed. Read more

ddanchev.blogspot.com
Unprofessionally Piggybacking on my Research. Read more

ddanchev.blogspot.com
Rogue RBN Software Pushed Through Blackhat SEO. Read more

www.f-secure.com
ZDNet Asia Compromised? Read more

www.f-secure.com
Unlocking Windows Using FireWire. Read more

www.f-secure.com
German Police Trojans. Read more

swatrant.blogspot.com
Zlob brings back fake MP3s! Read more

swatrant.blogspot.com
Fake Macromedia Flash ActiveX Plugin. Read more

blog.trendmicro.com
Hundreds of Phish Kits on the Loose. Read more

blog.trendmicro.com
Targeted Attack in Mexico, Part 2: Yet Another Drive-By Pharming. Read more

www.prevx.com
MonaRonaDona - We might be in the AV industry, but at least we aren't STUPID! Read more

blogs.authentium.com
Rogue Anti-Malware Products. Read more

blog.threatfire.com
Developing Malware and Rogueware on the Same System. Read more

sunbeltblog.blogspot.com
Hacking a scam. Read more

www.securityfocus.com
MonaRonaDona -- The Pure Social Engineering Scam. Read more

www.securityfocus.com
Symantec State of Spam Report for March. Read more

www.darkreading.com
Tool Physically Hacks Windows. Read more

www.darkreading.com
Researchers Map Method for Spotting Suspicious Insiders. Read more

www.darkreading.com
New Method IDs Phishing, Malicious Domains. Read more

www.theage.com.au
Hack into a Windows PC - no password needed. Read more

www.builderau.com.au
Windows-based ATMs an easy touch for hackers. Read more

storm.net.nz
Firewire port == owned. Read more

 

Vulnerabilities & Exploits
www.0x000000.com
MSIE7 Remote File Read Access. Read more

 

News
blog.wired.com
Whistle-Blower: Feds Have a High-Speed Backdoor Into Wireless Carrier. Read more

www.securityfocus.com
Fraudsters piggyback on search engines. Read more

www.theregister.co.uk
Hackers find clever new way to hose Google users. Read more

www.securityfocus.com
Let's Go Crazy. Read more

www.theregister.co.uk
Ex-anti-virus chief in spyware scareware scam charges. Read more

www.theregister.co.uk
Networks left open to SNMP scans. Read more

www.dailymail.co.uk
Internet sites could be charged for clips of rape and 'happy slapping' as Tories unveil new cybersafety scheme. Read more

04 March 2008

Guides, Papers, etc
www.f-secure.com
MBR Rootkit, A New Breed of Malware. Read more

www.symantec.com
The Flow of MBR Rootkit Trojan Resumes. Read more

www.symantec.com
From BootRoot to Trojan.Mebroot: A Rootkit in Your MBR! Read more

www2.gmer.net
Stealth MBR rootkit. Read more

download.microsoft.com
A guide to basic computer forensics. Read more

www.eweek.com
Growth of Anti-Botnet Startups Points to AV Deficiencies. Read more

www.f-secure.com
Storm Reactivating. Read more

sunbeltblog.blogspot.com
More excess by Klik Revenue. Read more

sunbeltblog.blogspot.com
The Google Groups porn invasion continues. Reed more

www.viruslist.com
MonaRonaDona malware. Read more

www.avertlabs.com
Crimeware goes Mobile. Read more

ddanchev.blogspot.com
Embedding Malicious IFRAMEs Through Stolen FTP Accounts. Read more

www.disog.org
CME711 - Its a howl! Read more

isc.sans.org
Security Blog Catchup! Read more

blog.spywareguide.com
The Right Way, The Wrong Way. Read more

blog.trendmicro.com
Pay-Me-Pal Strikes Anew. Read more

www.darkreading.com
SNMP Scan Nets Thousands of Vulnerable Devices. Read more

www.darkreading.com
Canadian Cops Bust Identity Theft 'Hub'. Read more

www.darkreading.com
Sla.ckers.org Hit By Major DDOS Attack. Read more

www.eweek.com
A Racket`s Brewing in the Code Signing Cert Business. Read more

computerworld.co.nz
Hard drive encryption's Achilles heel. Read more

www.cw.com.hk
The insider. Interview with Bruce Schneier. Read more

blog.dkbza.org
Old interviews with members of 29A. Read more

Unprepared to Fight Worldwide Cyber Crime. Read more

www.upi.com
Analysis: Einstein and U.S. cybersecurity. Read more

 

Vulnerabilities & Exploits
www.securiteam.com
ICQ Toolbar IsChecked Denial of Service. Read more

 

News
edition.cnn.com
Report: China trying to crack U.S. computers, buy nukes. Read more

www.theregister.co.uk
Underground tools foil generic virus detection. Read more

computerworld.co.nz
Swedish officials' passwords revealed by hacker. Read more

www.theregister.co.uk
Smut peddlers and spammers invade Google Groups. Read more

www.chicagotribune.com
New Trier students hacks computer system to check class rank. Read more

www.secureworks.com
SecureWorks Reports Hackers Use Banking Digital Certificates to Scam Financial Customers in US, Europe, Australia and New Zealand. Read more

www.security.itproportal.com
New Zealand teenager's exploit prove hacking advances. Read more

02 March 2008

Guides, Papers, etc
www.shadowserver.org
RBN “Rizing” ABDALLAH INTERNET HIZMETLERI (AIH). Read more

www.shadowserver.org
Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines. Read more

www.wired.com
Teenage Hacker Is Blind, Brash and in the Crosshairs of the FBI. Read more

news.zdnet.co.uk
Governments prepare for 'cyber cold war'. Read more

www.efluxmedia.com
Internet Safety Task Force To Protect Teens From Online Attacks. Read more

www.f-secure.com
Windows Mobile Trojan InfoJack. Read more

www.f-secure.com
Anatomy of a Rock. Read more

blog.trendmicro.com
RTKT_PUSHU.AC - Rootkit Remover? Read more

www.davidlitchfield.com
02/27/2008: "Slammer: recognizing a "fist" in exploitcode". Read more

isc.sans.org
Slow Saturday - Loopback URL and Salary Survey request. Read more

isc.sans.org
Smiling Bob or Lying Bob you decide. Read more

isc.sans.org
Dense Distributed SSH bruteforce attempts. Read more

isc.sans.org
Linux, FreeBSD and Mac (!) bot. Read more

isc.sans.org
Wireshark 0.99.8 released. Read more

ddanchev.blogspot.com
RBN's Phishing Activities. Read more

ddanchev.blogspot.com
Yet Another Massive Embedded Malware Attack. Read more

sunbeltblog.blogspot.com
More toolbar fun. Read more

swatrant.blogspot.com
WebVideoSetup and Multimedia Decoder. Read more

swatrant.blogspot.com
Ax Video Plugin. Read more

blog.trendmicro.com
Arsenal Fan Site Compromised, Serves Malware. Read more

blog.trendmicro.com
Spyware from World’s Largest Podcast Directory. Read more

blog.trendmicro.com
Trojanized Word Docs Used in Another Targeted Attack. Read more

www.darkreading.com
Tech Insight: Hacking Your Encryption Options. Read more

www.darkreading.com
Researchers Name Top Six Spamming Botnets. Read more

www.darkreading.com
Study: Consumers Don't Use Anti-Phishing Defenses. Read more

www.darkreading.com
Stolen FTP Credentials Offered for Sale: Major Firms at Risk. Read more

www.disog.org
RFI's and Phishing Tricks. Read more

www.disog.org
Researching your own botnets. Read more

blogs.securiteam.com
New linkedin ’status’ feature now used for donation spam. Read more

news.zdnet.co.uk
Inside the Symantec Security Response labs. Read more

apcmag.com
Has Vista lost all credibility? Read more

www.technewsworld.com
Going to Extremes to Protect Banking Customer Data. Read more

www.cwnp.com
Certified Wireless Analysis ProfessionalOfficial Study Guide. Read more

www.openrce.org
Defeating HyperUnpackMe2 With an IDA Processor Module. Read more

www.openrce.org
The Viral Darwinism of W32.Evol. Read more

www.podtrac.com
Audio. Security Now 133: TrueCrypt 5. Listen

 

Vulnerabilities & Exploits

 

Tools:
www.wireshark.org
Wireshark 0.99.8 released. Read more

zeroq.kulando.de
Infiltrator v0.1 for quick and dirty botnet monitoring. Read more

 

News
www.securityfocus.com
Law makers voice concerns over cybersecurity plan. Read more

www.theregister.co.uk
Orkut worm feeds on scraps. Read more

www.theregister.co.uk
Most spam comes from just six botnets. Read more

www.theregister.co.uk
Alleged Kiwi botnet mastermind in court. Read more


Copyright© MegaSecurity.org