<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Botnets identified and blocked with new hosted service

July 31, 2007

Botnets identified and blocked with new hosted service: "A security tool that identifies botnets and blocks attacks from these zombie networks is being made available by Trend Micro online in the software-as-a-service model."

Source: computerworld

So many passwords, so little memory - Telegraph

So many passwords, so little memory - Telegraph

Source: telegraph

Share's top five ways to survive a disaster

July 30, 2007

Share's top five ways to survive a disaster

Source: computerworld

Techworld.com - Researchers find vulnerabilities in forensic software

Techworld.com - Researchers find vulnerabilities in forensic software: "Researchers have been hacking forensic tools for years, but have focussed on techniques that intruders could use to cover their tracks and thwart forensic investigations."

Source: techworld

Techworld.com - What search engines store about you

Techworld.com - What search engines store about you: "Microsoft Live Search also records the type of search you conducted (image, web, local, etc.), while Google additionally stores your browser type and language. And when you click on a link displayed on Google, that may also be recorded and associated with your computer's IP address."

Source: techworld

Mozilla admits Firefox is flawed just like IE

Mozilla admits Firefox is flawed just like IE: "'We thought this was just a problem with IE,' Snyder continued. 'It turns out, it is a problem with Firefox as well.'"

Source: computerworld

Hitachi goes global with vein recognition biometric | The Register

Hitachi goes global with vein recognition biometric | The Register: "Hitachi reckons vein authentication can offer higher accuracy rates than finger print recognition, with the additional benefit that finger vein patterns are thought to be impossible to forge."

Source: theregister

PC World - Google: No Limits?

July 28, 2007

PC World - Google: No Limits?: "Is there any business Google won't get into?"

Source: pcworld

Phishing tool constructs new sites in two seconds

July 21, 2007

Phishing tool constructs new sites in two seconds: "Software developers like to make installation of their programs simple and quick. So do hackers."

Source: computerworld

Secure IT Live » Blog Archive » From Information Warfare to privacy and lots in between

Secure IT Live » Blog Archive » From Information Warfare to privacy and lots in between: "China, information warfare and issues like privacy"

Source: secureitlive

Opinion: Hackers keep an eye out for mobile opportunities

Opinion: Hackers keep an eye out for mobile opportunities: "What a world. We have to fight off viruses, zombies, bots, phishing and on and on. Can you believe how many just plain evil people there are in the world? And what is their point? Simple thievery? To prove that they are smarter than the rest of us? And think of all the money that's spent on defending, as best we can, against these miscreants or on cleaning up the mess when they get the better of us? Indeed, what a waste."

Source: computerworld

Computer virus turns 25 | The Register

Computer virus turns 25 | The Register: "The computer virus turns 25 this month. Long-suffering computer users would be forgiven for thinking that the first computer virus appeared in the mid-1980s, but the first virus actually predates the arrival of the first IBM-compatible PC."

Source: theregister

Mac worm author receives death threats

Mac worm author receives death threats: "# 'You are lucky you are anonymous or I would put a bullet in your head for this!' -- Anonymous
# 'Nice try with the FUD [fear, uncertainty and doubt]. You are full of **** there is no such thing as an Apple Worm.' -- Jeff
# 'I dare you to demonstrate this at Defcon you ***** Microsoftie. We will drag you out, put a bullet in you, and bury your body so deep it will take a nuclear blast to find your body.' -- Anonymous"

Source: computerworld

Last Harry Potter book may have leaked online

Last Harry Potter book may have leaked online: "The widely anticipated last novel in the Harry Potter series may have been leaked online several days before its official release set for July 21."

Source: computerworld

FBI planted spyware on teen's PC to trace bomb threats

FBI planted spyware on teen's PC to trace bomb threats: "Within days, however, the FBI had obtained a warrant that allowed the agency to infect the student's computer with a program it called a Computer & Internet Protocol Address Verifier (CIPAV). 'If a warrant is approved, a communication will be sent to the computer being used to administer [the MySpace] user account 'Timberlinebombinfo,'' said FBI Special Agent Norman Sanders in the June 12 filing."

Source: computerworld

Perilocity: Military Information Security

Perilocity: Military Information Security: "— Military files left unprotected online, By Mike Baker, Associated Press Writer, Thu Jul 12, 8:03 AM ET"

Source: riskman.typepad

Dancho Danchev - Mind Streams of Information Security Knowledge: A Multi Feature Malware Crypter

Dancho Danchev - Mind Streams of Information Security Knowledge: A Multi Feature Malware Crypter: "part of the Malicious Wild West series -- this one is going way beyond the usual file obfuscation, and despite that it's offered for sale and not in the wild yet, it includes anti-sandboxing, and anti-virtual machine capabilities, as malware authors started feeling the pressure posed by the two concepts when it comes to detecting their releases."

Source: ddanchev.blogspot

Cracking the TPM chip – is it possible?

Cracking the TPM chip – is it possible?: "But when two researchers recently claimed they could crack the Trusted Platform Module (TPM) chip (the technology on which BitLocker is based), it prompted some discussion that this building block may contain a few cracks."

Source: techtarget

Cyberbullying bad, but not that bad - The Red Tape Chronicles - MSNBC.com

July 20, 2007

Cyberbullying bad, but not that bad - The Red Tape Chronicles - MSNBC.com: "On the other hand, 67 percent of kids said they were more likely to face real-world bullying than cyberbullying."

Source: msnbc

Dark Reading - Application and Perimeter Security - Russian Cyberspace Alive With DOS Attacks - Security

Dark Reading - Application and Perimeter Security - Russian Cyberspace Alive With DOS Attacks - Security: "The U.S. Computer Emergency Readiness Team, or US-CERT, Monday reported the presence of politically motivated cyberattacks occurring in Russian cyberspace."

Source: darkreading

A serious browser vulnerability, but whose? | The Register

A serious browser vulnerability, but whose? | The Register: "A serious vulnerability that causes Internet Explorer to launch Firefox and execute a malicious payload"

Source: theregister

Network Security: When Should You Announce a Breach?

Network Security: When Should You Announce a Breach?: "Once you've confirmed that a site has been compromised in some manner, after the incident is contained, the next question is a tricky one. 'Who do we tell?'"

Source: enterprisenetworkingplanet

15 free security programs that work

15 free security programs that work: "From the moment you switch on your PC, your system faces countless Internet-borne dangers, including spyware attacks, viruses, Trojan horses, home-page hijackers, and hackers trying to weasel their way into your system...
Preventing and Eliminating Malware
1. ZoneAlarm | 2. Comodo Firewall Pro | 3. Avast |4. AVG Anti-Rootkit | 5. Spyware Blaster |
Assessing risks to your system
6. AOL Active Security Monitor |7. McAfee SiteAdvisor | 8. LinkScanner Lite | 9. Internet Threat Meter | 10. Trend Micro HijackThis |
Covering your tracks and cleaning up
11. Kruptos 2 | 12. Transaction Guard | 13. CCleaner | 14. NoScript | 15. File Shredder 2 |"

Source: computerworld

Biometric data to be required upon exiting the United States : SecureID News

Biometric data to be required upon exiting the United States : SecureID News: "Foreign travelers will be required in the future to provide biometrics at airports when departing from the United States."

Source: secureidnews

Mobile Keyloggers and Your Credit Card Information >> MyMobiSafe.com Official Mobile Security Antivirus Solutions Blog >> MobileTech's Blog at ZDNet U

Mobile Keyloggers and Your Credit Card Information >> MyMobiSafe.com Official Mobile Security Antivirus Solutions Blog >> MobileTech's Blog at ZDNet UK Community: "Every credit card type is identifiable by the first four digits making your credit card number the easiest data for mobile keyloggers to target."

Source: zdnet

A glitch in the Matrix, or a hungry exploit? | The Register

July 10, 2007

A glitch in the Matrix, or a hungry exploit? | The Register: "Sustained over the last 24 hours, the traffic index has dipped almost five per cent, packet loss has climbed to 11 per cent, and the global response time to almost 150 ms."

Source: theregister

Money & Business: Credit Card Companies Offer Unique Experiences as Rewards - US News and World Report

Money & Business: Credit Card Companies Offer Unique Experiences as Rewards - US News and World Report: "Now it's all about experiences. Visa offers customers the chance to hobnob with rock stars like Elvis Costello and NFL draftees, American Express sends clients up into space on suborbital jets, and MasterCard invites people to name the experience they want the company to arrange."

Source: usnews

Techworld.com - Symantec ready to offer Chinese users compensation

July 06, 2007

Techworld.com - Symantec ready to offer Chinese users compensation: "Symantec is to offer Chinese users compensation for a faulty update that knocked out 50,000 PCs."

Source: techworld

Techworld.com - Analyst warns on point-of-sale security

Techworld.com - Analyst warns on point-of-sale security: "When a card is swiped, point-of-sale (POS) terminals often collect and store the data held in the magnetic stripe on the back of a credit card, said Avivah Litan, a Gartner vice president and distinguished analyst. Retailers are often unaware that their POS applications collect so much information."

Source: techworld