|Bookmark or link to: www.kobayashi.cjb.net. All other url`s could change!|
|News Archive Translate Traducen|
|News July 2000|
HPTeam Mail Trojan 0.03.
Rat Cracker 1.31 by "The ExCon" is a password cracker for Deepthroat, Doly, Netbus, Subseven and Wincrash.
Microsoft Security Bulletin (MS00-028)
AckCmd is a special kind of remote Command Prompt for Windows 2000. It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through a firewall in some cases.
More Information and download.
NetView scans IP addresses for available Windows File and Print Sharing resources.
The Harvard Journal of Law and Technology:
Trojan CC Invader.
Van Hauser wrote the article "Placing Backdoors Through Firewalls".
Anti Pedo Worm by Del_Armg0.
Microsoft Security Bulletin (MS00-047):
CERT® Coordination Center:
Network World Fusion
Latest version of Trojan HostControl: HostControl Professional.
Net-Commando 2000 is an Internet security application which claims: "lets you detect and remove all known and unknown Trojan Horses from your computer". It features system analysis tools, such as a startup analyzer, process manager, an executable analyzer, as well as the ability to generate network statistics.
Microsoft Security Bulletin MS00-032 announces the availability of a patch that eliminates a vulnerability in Microsoft® Windows 2000. Microsoft is committed to protecting customers' information, and is providing the bulletin to inform customers of the vulnerability and what they can do about it. Read more
The Anatomy of File Download Spyware
Trojan CrazzyNet 3.7.
Microsoft Releases IIS 5.0 Security Checklist Monday, July 24, 2000 - Microsoft recently released a new security-related document that helps administrators better secure their Internet Information Server 5.0 systems. The document is entitled "Secure Internet Information Services 5 Checklist" and lists a dozen specific items that must be addressed in addition to a few tweaks to the underlying Windows 2000 operating system.
Logon DoS when Windows 2000 is combined with EFS.
The "Persistent Mail-Browser Link" vulnerability (Patch available)
Results of the Distributed-Systems Intruder Tools Workshop. PDF File. Read more.
ZoneAlarm 2.1. The award-winning ZoneAlarm Internet security utility
increases security for Internet-connected personal computers with its unparalleled ease of use and strong protection features.
Report shows most companies use reactive approach to security that leaves holes (IT Director/Bloor Research)
ZDNet Australia: Tech News:
New trojan: Dark Connection Inside 1.2. Big thanks to GIAST.
Passive Aggression v1.0.
NetGuard will sit in your Windows system tray and monitor popular trojan ports for connection attempts. When a connection is made, the detected IP is traced and optionally logged to a file on your hard drive. The intruding computer is then automatically disconnected.
Network Administrators Tool for Analyzing and Sniffer
Idlescan alpha3 for Linux, bugs fixed
Microsoft Security Bulletin MS00-050 announces the availability of a patch that eliminates a vulnerability in the Telnet Server that ships with Microsoft® Windows 2000. Read more
Personal Firewalls / Intrusion Detection Systems
The Register: Wanna know how BT.com was hacked? Read more.
Why the Police Don't Care About Computer Crime.
AntiOnline: Denial-Of-Service Threat Gets Ietf's Attention. Read more.
To heck with hactivism
Trojan Barrio Trojan 3.10.
Weekly Microsoft Security Digest 2000/07/17 to 2000/07/23. Read more.
Weekly Linux Security Digest 2000/07/17 to 2000/07/23. Read more.
Weekly Solaris Security Digest 2000/07/17 to 2000/07/23. Read more.
ICAT is a searchable index of information on computer vulnerabilities. It provides search capability at a fine granularity and links users to vulnerability and patch information. Link.
The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Read more.
GUI trojan creator… TROJ_SENNASPY.2K Read more.
Applause for IE's Cookie Catcher. Read more.
Performance versus security. Read more.
U.S. lawmakers introduce workplace privacy measure. Read more.
Cracked! Part 7: The Cracker's Revenge. Read more.
Korean cyberthieves sell hacked customer information. Read more.
Trojan Host Control 2.5.
Web blocking software can be easily bypassed.
Biggest German free e-mailer hacked. Read more.
State Department stricken by computer virus. Read more.
Powergen in security scandal - thousands of debit card details open to abuse. Read more.
New Trojan PC Invader 0.7. Thanks to Senna Spy.
Remotely Exploitable Buffer Overflow in Outlook "Malformed E-mail MIME Header" Vulnerability. Published by USSR. Read more.
CNN: Microsoft scrambling to fix new Outlook security hole. Read more.
surfCONTROL SuperScout URL blocking can be easily bypassed. Read more.
Rain Forest Puppy, a.k.a. RFP:
The bane of Microsoft. Best known for releasing the Microsoft IIS RDS exploit
used by thousands of script kiddies. RFP is the author of the Web-scanning tool
whisker, which can defeat intrusion detection systems. RFP is credited for
recently revealing a backdoor inserted by Microsoft engineers that stated that
"Netscape engineers are weenies!" RFP prefers to keep his professional identify
anonymous. Read more.
They Gain Root
Scam artist copies PayPal Web site. Read more.
'New breed' drowning out hacker culture? Read more.
Spying or Security? Read more.
Barrio Trojan 3.05. Thanks to Explorer!
It will send reports to your E-Mail each time person connects to internet.
What you can find in reports:
- Dial-Up password
- Cached resourses
- Crypted passwords from E-Type Dialer
- Everything that was pressed in some windows (Login request e.t.s.)
Send bugs, suggestions to Barrio.
Windows NT rootkit alpha Release 0.31 (source and debug-build binary, NT 4.X and 5.X Only) 222Kb.
Trojan Reversing by defiler.
Win32 Buffer Overflows by dark spyrit AKA Barnaby Jack
Malicious ActiveX Content Embedded in Microsoft Office Documents Threatens Windows Users. Read more.
Patching the NT Kernel
Microsoft adds cookie control to IE 5.5. Read more.
Security Scanner Nessus 1.0.3. Read more.
Paranoia Runs Deep at Hacker Convention. Read more.
Bug Watch: a two Trojan Horse race. Read more.
Software Functions As A Robotic Hacker. Read more.
Mitnick teaches 'social engineering. Read more.
Teen hacked into local server from abroad.
BT hacked: Revenge for crap service. Read more.
Dripper grabs dial up information on a local computer.
ToPo 1.2 adds 'codeable' areas to Win32 exe/dll's. By MrCrimson.
Ginastub 1.0 is a WinLogon password grabber. By txGreg .
AntiSniff 1.02 for Win 95/98/NT byL0pht Heavy Industries.
Libnet for NT available from eEye. Read more.
Known NT Exploits
Design and Implementation of a Sniffer Detector. Read more.
Another security hole found in Microsoft's Outlook. Read more.
First AutoCad virus found. Read more.
Zonealarm Firewall can be easily scanned for open ports. Read more.
Out of order SMTP DATA command can be used to bypass firewall protection. Read more.
Another brick in the wall.
Why Do I Have to Tighten Security on My System? Read more.
The Name Game: Groking the Love Bug.
Security guru: Napster a security risk. Read more.
The Legality of Linking.
Hackers: The millennial scapegoats? Read more.
Teen Hacking Idol Hits Big Apple. Read more.
New version of SheepGoat. Server only 14k.
The "Nessus" Project aims to provide to the internet community a free, powerful,up-to-date and easy to
use remote security scanner.
Anonymizer Surfing prevents web sites from tracking you and from accessing sensitive information in your browser. The Anonymizer acts as an agent between you and the site you want to view. You go to the Anonymizer, then the Anonymizer goes off in the network to find the page you wish to view, and then the Anonymizer shows you the page. It acts as a security screen between you and the web site page. Link.
Apache and Secure Transactions. Read more.
Microsoft Security Bulletin (MS00-043)
A Prime Port of Call for Hackers?
Interception Capabilities 2000
Long file names cause havoc. Read more.
Bureau names new eFBI chief.
White House proposes updated wiretapping laws. Read more.
Pssssst ... someone may be following you on the Internet. Read more.
Engage proposes P3P for Cookies standard. Read more.
New Trojan: PrivatePort 001a
Securing Your Home Network. Read more.
Yesmail Fights Blacklist Threat. Read more.
E-tailers Hit Hard By Credit Card Fraud. Read more.
In Unique Tactic, ACLU Seeks FBI Computer Code On "Carnivore" and Other Cybersnoop Programs. Read more.
When hacking is guessing. Read more.
White House Proposes Extension of Federal Wiretap Laws. Read more.
Calling the Cops. Read more.
Trapdoor Server. Thanks to Senna Spy.
Personal Firewalls / Intrusion Detection Systems. Read more.
Weekly Microsoft Security Digest 2000/07/10 to 2000/07/16 Read more.
Weekly Linux Security Digest 2000/07/10 to 2000/07/16. Read more.
Weekly Solaris Security Digest 2000/07/10 to 2000/07/16. Read more.
Weekly BSD Security Digest 2000/07/10 to 2000/07/16 . Read more.
Linux Magazine: Unix Security Holes. Read more.
Net bulletin boards will be watched. Read more.
ADSL fundamentally insecure - BT. Read more.
Scour Denies Unauthorized File Sharing. Read more.
Hollywood vs hackers in US court case. Read more.
Calling the Cops. Read more.
Trojan Y3K Rat 1.2 by -/Chucky-\- and [Firelarm].
Trojan cleaner: The Cleaner 3.0.
New Release 7-9-2000:
Instructor is a 32-bit instruction set auditor. By sequentially executing every 32 Bit OpCode, it is easy to find instructions that might have adverse effects on operating environments. For example, Instructor was used to find the non-privileged halt instruction. Link.
The "Nessus" Project aims to provide to the internet community a free, powerful,up-to-date and easy to use remote security scanner. A security scanner is a software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way. Link.
The Deception ToolKit (DTK) is a toolkit designed to give defenders a couple of orders of magnitude advantage over attackers. The basic idea is not new. We use deception to counter attacks. In the case of DTK, the deception is intended to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities. DTK's deception is programmable, but it is typically limited to producing output in response to attacker input in such a way as to simulate the behavior of a system which is vulnerable to the attackers method. Link.
WebTrends Security Analyzer discovers and fixes the latest known security vulnerabilities on Internet, intranet and extranet hosts. Currently Security Analyzer supports over 1000 tests for Windows, Solaris and Linux with the most advanced agent-based technology available. Link.
LANguard safeguards your network against unauthorised access, hackers, trojans and password crackers and prevents misuse of the internet by employees. Link.
Remailer Programs. Link.
A Balanced Approach to DoS
HACKER WHACKER scans your computer for free.
Web Scan Network Audit
Cult of the Dead Cow's bizarre theater. Read moe.
Hacked Web Sites. Link.
Hacker zine prepares to defend itself in court. Read more.
Hotmail compromises users' data... again. Read more.
Hooker 2.5. Thanks to Duke/SMF, president of Super Malware Force group.
UIN to IP finds IP from UIN by PhilippP.
Hardening Windows NT Against Attack by Paul E. Proctor. Read more.
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. Link.
Vetescan is a bulk vulnerability scanner which contains programs to check for and/or exploit many remote network security exploits that are known for Windows or UNIX. It includes various programs for doing different kinds of scanning. Fixes for vulnerablities are included along with the exploits. Link.
NAT (NetBIOS Auditing Tool)
Fragrouter is aimed at testing the correctness of a NIDS,according to the specific TCP/IP attacks listed in the Secure Networks NIDS evasion paper.  Other NIDS evasion toolkits which implement these attacks are in circulation among hackers or publically available, and it is assumed that they are currently being used to bypass NIDSs. Link.
Apache::ASP security hole. Read more.
Java Web Server vulnerable to remote command execution. Read more.
Internet Explorer 5.5 and 5.01 suffer from a security problem that enables malicious web sites to create a special HTML page which reads the content of any local and remotely accessible html or text file. The real danger is reading parsed web pages from Intranet web servers that are supposedly secured behind the firewall. The bug is also exploitable from HTML based email messages. IE 5.5 local text file reading vulnerability .
Tracing e-mail by Frederick M. Avolio.
Big Brother daemon listens for incoming connections on port 1984. Two separate security holes allow remote attackers to read and write arbitrary files on the system, entirely compromising the server's security. Read more.
"How I hacked PacketStorm" by rain forest puppy.
A Very Good Year For Viruses.Read more.
EarthLink just says no to FBI's Carnivore. Read more.
Hacker Charged In NASA, University Break-Ins. Read more.
NASA blocks all Excite@Home traffic to thwart hackers. Read more.
You can contribute to this site by submitting trojans, url`s and voting.
Trojan Nirvana 1.99 with sources.
Port scanner: 7thSpere 1.2 basic.
Encryption Plus for Email is a one-step, e-mail encryption plug-in for Microsoft Outlook. This handy utility lets you encrypt your outgoing messages with a single mouse click. Your recipient only needs the password in order to read your message.
L0phtCrack is designed to recover passwords for Windows NT. NT does not store the actual passwords on an NT Domain Controller or Workstation. Instead it stores a cryptographic hash of the passwords. L0phtCrack can take the hashes of passwords and generate the cleartext passwords from them. Read more
Backdoors and Rootkids. Read more.
Any clear text sent through network services such as e-mail, web pages and similar mediums are easily read by individuals using packet sniffers as the packets with the clear text information travel across networks.Information that is transmitted over insecure communications are subject to intercept or collection by criminals or others snooping on the Internet.
BSD Security. Read more.
The SmartDownload feature in Netscape's Navigator browser (included as an option since version 4.7) logs user downloads and sends this data to Netscape. This data includes the file name, the file's server name and
the user's IP address. It may also include the user's email address. A cookie pointing to this information is also added to the browser. This is all done without informing the user or asking his/her permission.
Cisco firewall falls for forged packets. Read more.
Nearly undetectable tracking device raises concern. Read more.
The Cookie Leak Security Hole in HTML Email messages. Read more.
A Web Bug is a graphics on a Web page or in an Email message that is designed to monitor who is reading the Web page or Email message. Web Bugs are often invisible.
Hotmail glitch exposes email addresses. Read more.
NSI to close hijack Hole. Read more.
Story: Don't Get Burned: Get a Firewall (Here's How). Read more.
Microsoft admits to Internet Explorer bug. Read more.
Security group going to the dogs after hoax alert. Read more.
FBI about hidden zombie network software. Read more.
Computer hackers decipher secret information on Mexico's bank scandal. Read more.
Smash virus more hype than hurt. Read more.
Sony dogged by Internet hacker spoof. Read more.
Domain Hijacking: A step-by-step guide. Read more.
U.S. Probation Office lets high-profile hacker Kevin Mitnick back online. Read more.
Avoiding future denial-of-service attacks. Read more.
Two accused of hacking NASA computers. Read more.
Senna Spy Auto Trojan.
This is an especial trojan, there does not exist another similar in the world !
. It auto-send files of the a infected machine to a ftp.
This allow you get files of the computer, without need manualy download and upload files. By Senna Spy.
Lobo 1.2. Simple, yet very effective program that launches a "counter-attack" against anyone who makes the mistake of scanning you for Back Orifice servers. By Low Noise.
Ch3 backdoor linux by Champion.
IRC plugin 1_81-4 for BO2K. It is an IRC client, Channel Bot style. Is fully customizable and once logged into an IRC server, it is remotely administrable through the IRC /msg or /query commands. The bot will rejoin any channel where get kicked, reconnect on disconnect, generate random nicks on raw 432 or 433, can delete, list, copy, spawn files on remote machine through irc. Changes: Added a packet flooder for taking down connections.
'Smash' virus could attack on Friday. Read more.
Network Security, Filters and Firewalls. Read more.
Security Site Handbook by Fraser.
Defending Against Sequence Number Attacks by Bellovin.
The SANS Institute: "Handling A Distributed Denial of Service Trojan Infection: Step-by-Step." Read more.
Denial of service. Read more.
RID can detect any remote software that ellicits a predefined response to a given set of packets.
Anonymity and privacy on the Internet. Read more.
Super MalWare Force is a great site about vrii. SMF
L0pht Heavy Industries.
Default Password List Link
Were You Ready for the Melissa Virus? Read more.
Credit card fraud affects 1000's weekly. Read more.
Hack university: Learning from the pros. Read more.
the art of backdooring vol 1 by haz0r (c) 2k. Read more.
Kevin Mitnick's reversal of fortune. Read more
FBI Using Automated Internet Wiretap. Read more.
NASA Hacker Busted in N.Y. Read more.
Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks. Read more.
Scan. A Story. Read more.
Hacking: It's a love-hate relationship. Read more.
Script kiddies: The Net's cybergangs. Read more.
FBI investigates Qualcomm hacker attack. Read more.
'Carnivore' Eats Your Privacy. Read more.
Skydance 2.23 beta.
Trojan Security monitors 12 different ports where trojans are known to be installed. When an intruder attempts to connect to the port, Trojan Security alerts you and relays information about the attack and the attacker. It also disconnects the intruder.
Cookie Crusher controls Web browser cookies in real-time before they are placed on your hard drive.
An Introduction to PGP. Read more.
A Prime Port of Call for Hackers?
Stolen Computers Will Self-Destruct. Read more
Cracked! Part 7: The Cracker's Revenge. Read more.
Openhack gets cracked! Read more.
Learning how to hack the enemy. Read more.
VASCO's Digipass Technology Helps Fight Crime by Securing Internet Gang Database. Read more.
Open Sources:Outsourcing security. Read more.
Microsoft bids bye-bye to Java. Read more.
FBI’s system to covertly search e-mail raises privacy, legal issues. Read more.
Microsoft aims to sell developers on its new computing platform. Read more.
Internet hacking threat to national security. Read more
Mitnick gets OK to lecture, consult. Read more.
OpenSSH's Cinderella story. Read more.
Internet Attacks More Serious and Technically Complex Says Author of ''Building Internet Firewalls. Read more.
Computers Made Plain - When Checking Network Security, Can You Hire Hacker Think Tank? Read more.
Remote Explorer 2000: fixed server.
Passive OS fingerprinting technique bases on information coming from remote host when it establishes connection to our system. Captured packets contains enough information to determine OS - and, unlike active scanners (nmap, queSO) - without sending anything to this host. Passive OS fingerprinting tool.
Fling is a new suite of internet protocols that perform the function of DNS, TCP, and UDP in a manner that's both untraceable and untappable. Fling protects clients from servers, servers from clients, and both from an eavesdropper in-between. The result is that anyone can serve or retrieve any data, without fear of censure. Read more.
This script will upload a trojan to an RDS vulnerable site and will execute the trojan (as long as it runs on NT).
Netkill - generic remote DoS attack tool. read more.
Elza is a script language, which doubles as a unique attack tool. This script language allows you to write simple scripts that mimic HTTP clients, and can be used to test HTTP servers' security.
Zombie Zapper is a free, open source tool that can tell a 'zombie' system flooding packets to stop flooding. This affectively stops Trinoo, TFN, and Stacheldraht. Read more.
Tripwire - The Only Way to Really Know. Read more.
Can anyone crawl into your computer while you're connected to the Internet? You may be VERY surprised to find out! Shields Up.
FBI system covertly searches e-mail.
Security, the Way It Should Be. Read more.
BorderManager allows unauthenticated user to surf as any authenticated user. Read more.
CheckPoint FW1 SecureRemote DoS. Read more.
New Denial of Service attacks on Windows 2000 Server. Read more.
The Love Bug.
Counterpane To Offer Hacker Insurance. Read more.
Hackers and viruses to cost business $1.6tn. Read more.
Sofware cracking challenge. Link.
The DSL Experience. Read more.
It Pays to Cheat, Not Surf. Read more.
Weekly Microsoft Security Digest. 2000/07/03 to 2000/07/09. Read more.
Weekly Linux Security Digest 2000/07/03 to 2000/07/09. Read more.
Weekly Solaris Security Digest 2000/07/03 to 2000/07/09. Read more.
Weekly Axent Security Digest 2000/07/03 to 2000/07/09. Read more.
Weekly BSD Security Digest 2000/07/03 to 2000/07/09. Read more.
Weekly Check Point Security Digest 2000/07/03 to 2000/07/09. Read more.
CERT Advisory CA-2000-13 Two Input Validation Problems In FTPD, Read more.
Microsoft's Outlook is vulnerable to Internet-borne virus attacks, the next generation of which will be able to execute on arrival and infect a system, without attachments. Read more.
Study Tallies High Expense Of Computer Viruses. Read more.
Feature: Cracked! Part 7: The Cracker's Revenge
TROJ_SENNASPY.2K Read more
Virus name: VBS/COD,
Aliases: Crayon of Doom, LIST.VBS, PORNLIST.DOC
FBI Investigating Qualcomm Hacker. Read more.
Lloyd's offers hacker insurance. Read more.
British 'hacker' files case against Emirati telecoms. Read more.
Trojan Gip 1.12 modified.
Confused yet about NT passwords? Try the 7-14 rule; those numbers work better than most. Read more.
Everything You Need to Know About Intrusion Detection' to Help Companies Protect Their Critical E-Business Assets from Hackers. Read more.
Intruder Alert: Detect and Respond to Attacks Before It's Too Late. Link
AOL/Netscape hit with privacy lawsuit. Read more.
IT Week: Microsoft tries to allay security fears. Read more.
Should you encode your e-mail? Read more.
AOL Enhances E-Mail To Protect Against Scams. Read more.
Hooker 2.52 can download files from any location in internet and start them absolutely invisible from user.
Works under any Win32 platform (Win95/98/NT)
Symantec releases cyber security survey. Read more.
A Security Pitfall: the Dial-Up Modem. Read more.
It's Time to Clamp Down -- When It Comes to Data And System Security, Many Businesses Have Good Intentions. But Attacks And Other Breaches Continue to Exact A Huge Toll. Read more.
Scanning the World.
FBI Investigates Qualcomm Hacker Attack. Read more.
Sneaky new virus format has software makers scrambling. Read more.
Norton Antivirus update crashes some PCs. Read more.
Hacker insurance. Read more.
Linux World dishes dirt on ISS founder. Read more.
Accused hacker sues Mideast Internet company for defamation. Read more.
SubSeven Java Client 0.4 beta
GConvert is a powerful tool that lets you view and extract all icons from any Windows icons files such as executable, DLL, ICL, OCX, VBX, CPL, NIL, IL files... Then GConvert allows you to save your extracted icons as icon, bitmap, GIF, JPG, PNG formats or even copy them to the Windows clipboard for re-use in your applications, documents, Web pages. Link
Lee Ashurst, the 21-year-old British resident of Dubai who was recently arrested for allegedly hacking the United Arab Emirates ISP Etisalat, has set up a support website. Link.
Russia arrests US-Lithuanian hacker-spy. Read more.
E-Signatures: Ties That Bind. Read more.
Mail.com Anti-Virus Service Interceptions Increase 580 Percent in Second Quarter. Read more.
CyberGuard Corporation Announces Release 4.3 for KnightSTAR Premium Appliance Firewall. Read more.
Defending against Outlook viruses. Read more.
No Love for Computer Bugs. Read more.
What's the hat got to do with it? Read more.
Internet Spy Bill Set at £20m. Read more.
Web Contest Challenges Hackers To Crack Site. Read more.
Engineers on hacking charges. Read more.
Interpol asks Silicon Valley for anti-hacker help. Read more.
Trojan BioNet 2.6.1a.
OpenSSH UseLogin Vulnerability. Read more.
Interpol to Get Bay Area Help Foiling Hackers. Read more.
Crypto Users Can't See FBI.gov. Read more.
Defending against Outlook viruses. Read more.
A Year Ago: Exclusive: UK hackers have an easy life. Read more.
Interpol may enlist AtomicTangerine to help with hackers . Read more.
New version of AntiLamer Toolkit Pro "Haebu CoceDA": Naebi 2.41.
Senna Spy Local Network Shared displays all shared devices in a local network.
Compromises via WU-FTP "site exec" Vulnerability.
Trojan Alert: DILBER Trojan.
Was Arab ISP Hack Illegal? Read more.
Closing Another IE Security Hole.
By 2002, approximately 19 million people worldwide will have the skills to mount a cyber attack. Read more.
How Hackers Hack. Read more.
How To Become A Hacker. Read more.
Trojan NetSpy 2000.
How to protect your network. Read more.
New legal storm on Net horizon. Read more.
Crackers are common criminals. Read more.
Kaspersky Lab Warns Of Worm-Infected Web Pages. Read more.
Accused UAE Hacker Files Defamation Lawsuit. Read more.
Stages Virus Most Common In Survey. Read more.
Houston, We Don't Have A Problem. ….Read more.
NASA disputes report that hacker endangered astronauts. Read more.
E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation. Read more.
Web page virus prompts security concerns. Read more.
UK managers ignorant over danger of Internet hackers. Read more.
New version of the Doly Trojan. Doly 2.0.
Weekly Microsoft Security Digest 2000/06/26 to 2000/07/02. Read more.
Weekly Linux Security Roundup 2000/06/26 to 2000/07/02. Read more.
Weekly Solaris Security Roundup 2000/06/26 to 2000/07/02. Read more.
SMS-Notify for german users (D1, D2, E-Plus) !!!
British 'hacker' in UAE creates website to garner support. Read more.
Student pleads guilty to hacking government computers. Read more.
Rain Forest Puppy. Read more.
Survey - Cybercrime Concern Outweighs Precautions. Read more.
Judge: Hacker In Officer's Hands. Read more.
Teens Accused of Duping AOL Users. Read more.
New trojan Voodoo Doll. Thanks to Senna Spy.
Free Linux Firewall Released to Public. Read more.
Student Admits Government Hacks. Read more.
Hotmail Is Victim Of E-mail Prank. Read more.
Hackers break Dreamcast safeguards, distribute games online. Read more.
Small firms at risk from hackers. Read more.
Anti-hacker site raises hackles of online underworld. Read more.