<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Cyber Crooks Fish In Your Waters! by; Rick McCann www.privateofficer.com « Privateofficernews’s Weblog

December 29, 2007

Cyber Crooks Fish In Your Waters! by; Rick McCann www.privateofficer.com « Privateofficernews’s Weblog: "Their two-year rise might be the greatest success story of the former Eastern Bloc’s high-tech boom — if only it weren’t so illegal. The cash might be coming from your bank account, and they could be using the computer in your den to commit their crimes."

Source: privateofficernews

Being a Spy Technology Creator >> CRIMINOLOGY CEOLOGY >> Whistler's Blog at ZDNet UK Community

Being a Spy Technology Creator >> CRIMINOLOGY CEOLOGY >> Whistler's Blog at ZDNet UK Community: "We don't make software for the highest bidder, instead we make it for governments and agencies who vow to keep our name secret, because after all they are better at that than anyone in the tech industry."

Source: zdnet

State Hacking/Computer Security Laws

December 27, 2007

State Hacking/Computer Security Laws: "I thought it would be a cool project to collect all of the state hacking/computer fraud laws I could find into one collapsible menu system."

Source: irongeek

SANS Institute - SANS Top 20 Internet Security Risks of 2007 Point to Two Major Transformations in Attacker Targets

SANS Institute - SANS Top 20 Internet Security Risks of 2007 Point to Two Major Transformations in Attacker Targets: "Scenario 1: The Chief Information Security Officer of a medium sized, but sensitive, federal agency learned that his computer was sending data to computers in China. He had been the victim of a new type of spear phishing attack highlighted in this year's Top 20. Once they got inside, the attackers had freedom of action to use his personal computer as a tunnel into his agencys systems."

Source: sans

Cisco 2007 Annual Security Report



Source: cisco

Another month, another monster Apple security update

Another month, another monster Apple security update: "Including Monday's fixes, Apple has patched approximately 200 bugs in the nine security updates it has issued so far during 2007. Four of the nine featured fixes for more than 40 different vulnerabilities."

Source: computerworld

10 Tips on Using Public Computers Safely

10 Tips on Using Public Computers Safely: "Carry your Own Software
There are many software applications that can run off USB drives. For example, the portable Firefox browser will keep its cache and sensitive data on the USB drive, not the public computer's drive."

Source: mysecurepc

The Fuss About Gmail and Privacy: Nine Reasons Why It's Bogus

The Fuss About Gmail and Privacy: Nine Reasons Why It's Bogus: "For that matter, the very act of sending an email message consists of having a number of programs on different machines read and store your mail. Every time you send an email message, it is typically routed through a number of computers to get to its destination. Run the traceroute command at a command prompt on any Linux or UNIX system (including Mac OS X) or tracert on a Windows system to see the hops that your internet packets go through from your machine to any destination site. Anyone equipped with a packet sniffer at any of those sites can snoop any mail that they want. In fact, the NSA recently proved the effectiveness of this approach by tracking down terrorists by way of their mail traffic."

Source: oreillynet

End Users Flout Enterprise Security Policies - Security services News Analysis - Dark Reading

End Users Flout Enterprise Security Policies - Security services News Analysis - Dark Reading: "'We already know about users who create problems because they don't know the policy and about users who violate policies with malicious intent,' says Sam Curry, vice president of product management and marketing at RSA. 'What we're finding is that there is a third, growing group of users who knowingly violate security policy not to do something malicious, but because they are trying to get their jobs done. This sort of violation is innocent, but deliberate.'"

Source: darkreading

Free Preview - WSJ.com

Free Preview - WSJ.com: "So far this year, more than 270 organizations have lost sensitive information like customer credit-card or employee Social Security numbers -- and those are just the ones that have disclosed such incidents publicly."

Source: wsj

Lessons Learned - WSJ.com

Lessons Learned - WSJ.com: "Mr. Haephrati's Trojan took screenshots of the victims' computers at regular intervals. All of this information was sent back to nine servers, the back-office computers that store and process data, operated by the Haephratis and their cohorts."

Source: wsj

Holistic approach to security still missing, warns Ernst & Young - Computerworld UK - The Voice of IT Management

Holistic approach to security still missing, warns Ernst & Young - Computerworld UK - The Voice of IT Management: "Firms are still failing to implement a holistic approach towards information security as the security function remains too isolated from executive management and the strategic decision-making process, according to Ernst & Young’s tenth annual Global Information Secuirity survey."

Source: computerworlduk

China Link Suspected in Lab Hacking - New York Times

December 22, 2007

China Link Suspected in Lab Hacking - New York Times: "A cyber attack reported last week by one of the federal government’s nuclear weapons laboratories may have originated in China, according to a confidential memorandum distributed Wednesday to public and private security officials by the Department of Homeland Security."

Source: nytimes

Enterprise Security Today | Hackers Get Federal Lab Visitor Data

Enterprise Security Today | Hackers Get Federal Lab Visitor Data: "The assault was in the form of phony e-mails containing attachments, which when opened allowed hackers to penetrate the lab's computer security . The practice is called 'phishing .'"

Source: enterprise-security-today

Insider Threat to Information Systems

December 20, 2007

Insider Threat to Information Systems: "Example 7: On the programming staff of Ellery Systems, a Boulder Colorado software firm working on advanced distributive computing software, was a Chinese national who transferred, via the Internet, the firms entire proprietary source code to another Chinese national working in the Denver area. The software was then transferred to a Chinese company, Beijing Machinery. Ellery Systems was subsequently driven to bankruptcy by foreign competition directly attributed to the loss of the source code."

Source: rf-web.tamu

Bruce Schneier Blazes Through Your Questions - Freakonomics - Opinion - New York Times Blog

December 19, 2007

Bruce Schneier Blazes Through Your Questions - Freakonomics - Opinion - New York Times Blog: "Wireless is certainly the way of the future. From a security perspective, I don’t see any major additional risks. Sure, there’s a potential for messing everything up, but there was before. Same with power outages. Data transmitted wirelessly should probably be encrypted and authenticated; but it should have been over wires, too. The real risk is complexity. Complexity is the worst enemy of security; as systems become more complex, they get less secure. It’s not the addition of wireless per se; it’s the complexity that wireless — and everything else — adds."

Source: nytimes

How to Secure Your Computer, Disks, and Portable Drives | LISNews

How to Secure Your Computer, Disks, and Portable Drives | LISNews: "Bruce Schneier says Unfortunately, cryptography can't solve most computer-security problems. The one problem cryptography can solve is the security of data when it's not in use."

Source: lisnews

MI5 warns over China hacking menace | The Register

MI5 warns over China hacking menace | The Register: "MI5 has warned UK businesses of the threat posed by state-sponsored Chinese hackers. The UK security service has sent an advisory to banks and law firms warning them to guard against attack from 'Chinese state organisations'."

Source: theregister

Schneier on Security: Security in Ten Years

December 04, 2007

Schneier on Security: Security in Ten Years: "Predictions are easy and difficult. Roy Amara of the Institute for the Future once said: 'We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run.'"

Source: schneier

Photos: Inside Microsoft's war room | ZDNet Photo Gallery

December 03, 2007

Photos: Inside Microsoft's war room | ZDNet Photo Gallery: "A good deal of Microsoft's current security practices can be traced to painful lessons learned over the past 10 years. Microsoft's Security Response Center, at company headquarters in Redmond, Wash., grew out of those lessons."

Source: ZDNet