Home    News Archive    Translate Traducen
News September 2008
30 September 2008

Guides, Papers, etc
blogs.technet.com
The Case of the Slooooow System. Read more

www.thedarkvisitor.com
Bypassing the Great Firewall of China - iaminchina.com. Read more

ddanchev.blogspot.com
Modified Zeus Crimeware Kit Comes With Built-in MP3 Player. Read more

ddanchev.blogspot.com
The Commercialization of Anti Debugging Tactics in Malware. Read more

ddanchev.blogspot.com
Hijacking a Spam Campaign's Click-through Rate. Read more

ddanchev.blogspot.com
250k of Harvested Hotmail Emails Go For? Read more

ddanchev.blogspot.com
A Diverse Portfolio of Fake Security Software - Part Six. Read more

ddanchev.blogspot.com
Two Copycat Web Malware Exploitation Kits in the Wild. Read more

sunbeltblog.blogspot.com
Cute: Fake system shutdown message. Read more

sunbeltblog.blogspot.com
Spammed trojan downloads rogue antispyware. Read more

sunbeltblog.blogspot.com
World War 3 spam. Read more

www.securityfocus.com
U.S., China lead world in botnet attacks. Read more

msmvps.com
Information about the other "scareware" lawsuits...Read more

anti-virus-rants.blogspot.com
from the 'what were they thinking?' file. Read more

dvlabs.tippingpoint.com
ThreatLinQ: Enabling Packed Executable Filters. Read more

blog.spywareguide.com
A Phish With A Sense Of Humour. Read more

blog.spywareguide.com
Another Fake Youtube-Style Site. Read more

blog.spywareguide.com
419 Scammer Via Skype. Read more

www.0x000000.com
Who Wants To Root Philips. Read more

blog.trendmicro.com
In The Virtual Crime World, Merrill Lynch Follows Wachovia’s Fate. Read more

blog.trendmicro.com
Facebook Mystery Friend? No, Malware. Read more

blog.trendmicro.com
After Fake Blogs Come The Fake Forums. Read more

holisticinfosec.blogspot.com
Hype Alert: Internet Shopping Carts Are Secure. Read more

garwarner.blogspot.com
Digital Certificate Spammer Goes for Google Adwords. Read more

www.sciencedaily.com
Putting A 'Korset' On The Spread Of Computer Viruses: Invention Stays One Step Ahead Of Anti-virus Software. Read more

insecure.org
The New Nmap. Read more

www.itwire.com
Who is the Palin hacker? Read more

www.securityfocus.com
Blaming the Victim, Yet Again. Read more

www.f-secure.com
A Different Twist on the Path to the Kernel. Read more

blogs.paretologic.com
It’s never been easier to keep AV vendors behind. Read more

blogs.paretologic.com
Fake pop-ups really do work. Read more

isc.sans.org
ASPROX mutant. Read more

news.cnet.com
How 'carders' trade your stolen personal info. Read more

securitylabs.websense.com
CAPTCHA Revisited: Microsoft's "Revised" CAPTCHA Busted By Spammers For Mass-Mailing Operations. Read more

securitylabs.websense.com
How Malware Expands A Phishing Network. Read more

securitylabs.websense.com
Freezing Malware in Memory. Read more

evilcodecave.wordpress.com
Bank UBI Fraud - Phishing Domain. Read more

bjou.homeunix.net
A little Cutwail spambot analysis on network traffic. Read more

bjou.homeunix.net
Cutwail and Rustock/Costrat: Same Command-and-Control Network. Read more

msmvps.com
Bogus Adobe Flash Player extension. Read more

www.thedarkvisitor.com
Argentina President Christina Fernandez de Kirchner tax identification number altered by hacker. Read more

www.thedarkvisitor.com
Chinese hackers create botnets from computers within the PRC. Read more

www.darkreading.com
Debunking Security's Latest Popular Myths. Read more

www.xconomy.com
Boston Unblurred: Debunking the Google Maps Censorship Myth. Read more

crave.cnet.co.uk
The 50 most significant moments of Internet history. Read more

 

 

Vulnerabilities & Exploits
www.securityfocus.com
Apple, Cisco fix serious security flaws. Read more

 

Tools:
i72projekte.tm.uka.de
Distack - A Framework for Distributed Anomaly-based Attack Detection. Read more

 

News
www.washingtontimes.com
U.S. urged to go on offense in cyberwar. Read more

www.securecomputing.net.au
South Korean defence suppliers uncover malicious code. Read more

www.computeractive.co.uk
Microsoft targets spammers in legal blitz. Read more

computerworld.co.nz
Authorities close in on hackers who hit Bill O'Reilly's site. Read more

www.yle.fi
Local Police Resources Insufficient for Internet Watch. Read more

www.pcworld.com
Computer Users Overeager to Click Popup 'OKs'. Read more

www.theregister.co.uk
Nasty web bug descends on world's most popular sites, New York Times bitten hard. Read more

www.darkreading.com
CSRF Flaws Found on Major Websites. Read more

news.cnet.com
Microsoft, Washington state sue over 'scareware' pop-up ads. Read more

www.australianit.news.com.au
Nigerian held on web fraud. Read more

www.darkreading.com
New ID Theft Service Crawls the Web on Consumers' Behalf. Read more

www.chinatechnews.com
CNNIC: China's Internet Will Be Short Of IP Addresses Soon. Read more

news.bbc.co.uk
Alarm sounded on second-hand kit. Read more

www.dailytech.com
Man Murdered Over Online Dispute. Read more

22 September 2008

Guides, Papers, etc
edge.technet.com
Interview with Mark Russinovich: the future of Sysinternals, Security, Windows. Read more

www.eweek.com
Mark Russinovich On The Future Of Security. Read more

www.computerweekly.com
Cybercrime to grow because of government indifference. Read more

www.f-secure.com
Do spammers get spam? Read more

www.f-secure.com
JavaScript Injection Attack. Read more

www.avertlabs.com
Why Your Laptop Is Definitely Lost. Read more

www.avertlabs.com
The Continuing Saga of OpenSSH Attacks–Now With Backdoors. Read more

www.avertlabs.com
From Torrents to Casinos, Redirect Chaining Is Back in Fashion. Read more

ddanchev.blogspot.com
Spam Campaign Abusing Yahoo's Services. Read more

ddanchev.blogspot.com
EstDomains and Intercage VS Cybercrime. Read more

ddanchev.blogspot.com
Skype Spamming Tool in the Wild - Part Two. Read more

sunbeltblog.blogspot.com
Scam sites update V. Read more

blog.spywareguide.com
Fake Paypal Bruteforcer. Read more

blog.spywareguide.com
Dreamcast Hoaxes. Read more

blog.spywareguide.com
Online Pokemon Game + Adware? You Bet...Read more

www.trustedsource.org
Rise Of The PDF Exploits. Read more

www.trustedsource.org
Digging for Worms. Read more

www.thedarkvisitor.com
Chinese hacker “Milk Rebellion”. Read more

timesofindia.indiatimes.com
For terrorists, WiFi system safer option. Read more

www.computerworld.com
Skype won't say if it decrypts VoIP calls. Read more

www.eweek.com
How to Really Delete Data for Absolutely Sure. Read more

www.techworld.com
All webmail could be easy prey to tyro hackers. Read more

www.techradar.com
How to catch Linux system intruders. Read more

isc.sans.org
Data exfiltration and the use of anonymity providers. Read more

isc.sans.org
New (to me) nmap Features. Read more

blogs.technet.com
Internet Explorer security levels compared. Read more

www.smh.com.au
Riskiest celebrity web searches revealed. Read more

www.antisource.com
But... my antivirus said it was clean! Read more

www.theregister.co.uk
Ad hoc malware police besiege net neutrality. Read more

securehomenetwork.blogspot.com
Darkness At Dawn. (cybercrime and malware) Read more

securitylabs.websense.com
WBSN True Phishing Stories - eBay Motors. Read more

securitylabs.websense.com
Wget Denied. Read more

 

Vulnerabilities & Exploits
www.theregister.co.uk
VMware patches remote execution vulns. Read more

 

Tools:
lifehacker.com
MobaLiveCD Runs Linux Live CDs Inside Windows. Read more

 

News
www.wikileaks.org
VP contender Sarah Palin hacked. Read more

www.securityfocus.com
Palin e-mail intruder left digital trail. Read more

www.tomshardware.co.uk
Hackers Use Google to Break Into Palin's Email Account. Read more

www.computerworld.com
Report: FBI searches Tenn. student's apartment in Palin hacking case. Read more

www.domainnews.co
EstDomains Denies Links to Malware Distribution; Fails to Deny Washington Post Allegations. Read more

www.vnunet.com
QuickTime zero-day spotted. Read more

www.thedarkvisitor.co
Chinese hackers take down entire city network…Read more

15 September 2008

Guides, Papers, etc
voices.washingtonpost.com
A Superlative Scam and Spam Site Registrar. Read more

ddanchev.blogspot.com
Adult Network of 1448 Domains Compromised. Read more

ddanchev.blogspot.com
Summarizing August's Threatscape. Read more

voices.washingtonpost.com
Web Fraud 2.0: Fake YouTube Page Maker Helps Spread Malware. Read more

voices.washingtonpost.com
Fake Antispyware Purveyor Doubles as Domain Registrar. Read more

securitylabs.websense.com
Robot Dog: Recovery Software Penetrating Virus. Read more

securitylabs.websense.com
Presidential Election (spam) Campaign. Read more

evilcodecave.wordpress.com
Debugger Detection Via NtSystemDebugControl. Read more

blogs.technet.com
Life, the Universe, and Everything. Read more

sunbeltblog.blogspot.com
Scam sites update III. Read more

sunbeltblog.blogspot.com
Scam sites update II. Read more

sunbeltblog.blogspot.com
New Rogues: The Clone Mania. Read more

sunbeltblog.blogspot.com
Scam sites update. Read more

blog.trendmicro.com
Phishers Spoof Facebook (Again). Read more

www.avertlabs.com
If RBN is dead, their customers are still alive. Read more

securehomenetwork.blogspot.com
The RBN Operatives: Part II. Read more

securehomenetwork.blogspot.com
BEHIND THE MAKING OF THE ATRIVO TAKEDOWN. Read more

www.prevx.com
Problems with Antivirus 2009 ? You bet. Read more

garwarner.blogspot.com
Internet Landfills: Praise for Brian Krebs. Read more

garwarner.blogspot.com
FBI Cyber Agent Shawn Henry Earns Promotion. Read more

www.disog.org
Your Internet access is going to get suspended. - Once you install that rootkit. Read more

www.eweek.com
Still Overflowing After All These Years. Read more

www.eweek.com
When Windows Goes All 64-Bit. Read more

www.eweek.com
McAfee Putting Malware Signatures in the Cloud. Read more

www.computerworld.com
Microsoft defends IE8 'phone home' feature, clarifies privacy policy. Read more

taosecurity.blogspot.com
The Analyzer Charged Again. Read more

www.newsweek.com
The School of Hacking. Read more

www.f-secure.com
Trustworthy Domain. Read more

blog.wired.com
Large Hadron Collider's Hacker Infiltration Highlights Vulnerabilities. Read more

www.vnunet.com
Web site hacks continue through Q2. Read more

www.linuxhaxor.net
Creating Seamless Virtual Machine with Virtualbox 1.6. Read more

 

Tools:
nmap.org
Nmap 4.75 released. Read more

 

News
www.news.com.au
Atom smasher's computers hacked. Read more

www.washingtonpost.com
Va. Ban On Spam Is Ruled Unlawful. Read more

www.net-security.org
BusinessWeek website attacked and hosts malware. Read more

www.theregister.co.uk
TJX hacker breaks ranks with guilty plea. Read more

www.smh.com.au
Cyber crooks behind bogus Obama sex video. Read more

www.dailymail.co.uk
Taliban using Skype phones to dodge MI6. Read more

news.theage.com.au
Yahoo opens its doors to hackers. Read more

www.podtrac.com
Audio. Security Now. Listen

07 September 2008

Guides, Papers, etc
www.theregister.co.uk
Crimeware giants form botnet tag team. Read more

www.securityfocus.com
Security of Google's browser gets mixed marks. Read more

www.vitalsecurity.org
CHROME. Read more

www.securityfocus.com
WiMax: Just Another Security Challenge? Read more

www.insidefacebook.com
Update: Facebook Security Fighting Koobface Worm, Chain Letters. Read more

reviews.zdnet.co.uk
Security and wireless networking. Read more

www.eweek.com
What to Expect from Google in the Next 10 Years. Read more

www.eweek.com
Google's Chrome Shakes Up Browser Design. Read more

www.darkreading.com
Google Goes Its Own Way. Read more

www.darkreading.com
Facebook Application Transforms Social Network Into Botnet. Read more

www.darkreading.com
Oh, for a Little Reverse Engineering. Read more

ddanchev.blogspot.com
The Commoditization of Anti Debugging Features in RATs. Read more

ddanchev.blogspot.com
Copycat Web Malware Exploitation Kits are Faddish. Read more

ddanchev.blogspot.com
A Diverse Portfolio of Fake Security Software - Part Five. Read more

blogs.zdnet.com
Today’s assignment : Coding an undetectable malware Read more

garwarner.blogspot.com
Work at Home . . . for a Criminal? Read more

www.thedarkvisitor.com
Chinese hacker more popular than university president…wins 92% approval rating! Read more

blog.spywareguide.com
VBulletin Spam Tool In Circulation. Read more

blog.spywareguide.com
More MMORPG Fakeouts. Read

blogs.paretologic.com
Free rider. Read more

blog.trendmicro.com
Watch Out for Hurricane Gustav Relief Scams. Read more

www.avertlabs.com
The darksides domains. Read more

www.avertlabs.com
Google Chrome and the 404. Read more

www.avertlabs.com
Secure Your Wireless Router Part 2. Read more

sunbeltblog.blogspot.com
New rogue security product: Smart Antivirus 2009. Read more

sunbeltblog.blogspot.com
When extortionists don't deliver. Read more

sunbeltblog.blogspot.com
Have You Been a Victim of Unethical Software Company Practices? Read more

sunbeltblog.blogspot.com
Chrome rocks. I don't care what others say. Read more

www.f-secure.com
abuse@human-rights.org. Read more

www.f-secure.com
Google Chrome and Security. Read more

www.f-secure.com
Video - E:VOLUTION. Read more

isc.sans.org
Malware Analysis: Tools are only so good. Read more

isc.sans.org
Leap Ahead Ideas. Read more

isc.sans.org
New bgp hijack isn't very new. Read more

aolradio.podcast.aol.com
Audio. Security Now 160: Listener Feedback 49. Listen

gadievron.blogspot.com
RIP: Kevin Martin :( Read more

 

Tools:
projects.honeynet.org
Capture-HPC Version 2.5 Released. Read more

www.securiteam.com
Distack - A Framework for Distributed Anomaly-based Attack Detection. Read more

 

News
www.theregister.co.uk
North Korean Mata Hari in alleged cyber-spy plot. Read more

www.darkreading.com
Report: N. Korea Used Spyware, Sex in Targeted Attack on S. Korean Military. Read more

www.ynetnews.com
Canada: Israeli hacker suspected of involvement in major fraud case. Read more

www.canada.com
Infamous Israeli hacker linked to $1.8M heist. Read more

garwarner.blogspot.com
Is The Analyzer Really Back? (The return of Ehud Tenenbaum). Read more

blog.wired.com
Researchers Use Facebook App to Create Zombie Army - Update. Read more

www.theregister.co.uk
Employee has no privacy on company computers, US court rules. Read more

www.theregister.co.uk
Open source release takes Linux rootkits mainstream. Read more

news.zdnet.co.uk
Nasa hacker has 'shut down', say protesters. Read more

www.vnunet.com
More growing pains for Chrome. Read more

www.theregister.co.uk
Sophos DNS snafu creates update problems. Read more

www.computeractive.co.uk
FCC warns of new phishing scam. Read more

www.itweb.co.za
Kaspersky Lab announces patents for cutting-edge technologies. Read more

www.biosmagazine.co.uk
Wireless Broadband Hijacking On The Rise. Read more

www.computerworld.com
Facebook tests New Jersey's icon for reporting predators, pornography. Read more


Copyright© MegaSecurity.org