The Microsoft-Kelihos Tango Continues
Microsoft is going all out on hammering the last nail on Kelihos’s coffin. The takedown that took place 4 months ago is just the beginning. The software giant filed a complaint on Monday, January 23,...
View ArticleMicrosoft: Worm Operator Worked at Antivirus Firm
In a surprise filing made late Monday, Microsoft said a former technical expert at a Russian antivirus firm was the person responsible for operating the Kelihos botnet, a global spam machine that...
View ArticleSSCC 81 – NCSA and Data Privacy Day
Chet sits down with Michael Kaiser, Executive Director at the National Cyber Security Alliance (NCSA) to discuss Data Privacy Day. Michael explains the origin of Data Privacy Day, some of the...
View ArticleOnline Safety
A couple of weeks ago, I ran a highly unscientific survey on twitter. Asking what advice would people give to children about security. The response was overwhelmingly in favour of educating them to be...
View ArticleWikileaks and SharePoint
Bradley Manning is on trial. For some reason, we didn't find this Wired article linking Manning's document download spree with SharePoint until now. Here are the key passages: Special agent David...
View ArticleMegaup…d’oh.
You’re probably aware that Megaupload has wandered into what can only be described as a bit of a pickle, assuming said pickle is roughly the size of a Vogon Constructor Fleet. Given that lots of people...
View ArticlevCenter Events and Alarms
Veeam Software, a business continuity product company for virtualization, has a complete list of vCenter Events sorted by ID. Here's the first event in the list: ID Severity Group Message Catalog Text...
View ArticleYour [online] Reputation Precedes You
By: Brendon Lynch, Chief Privacy Officer for Microsoft Whenever someone tells me, “your reputation precedes you,” my immediate thought is I hope they mean that in a good way. As we conduct more of our...
View ArticleIs there really no innovation in information security?
According to a recent article on the CSO magazine web site, there's not enough innovation in the information security industry to let businesses keep up with the ever-changing threats that they face....
View ArticleRapid7 Exposé: Boardroom P0wn
Tremendous write-up at The New York Times, by Times reporter Nicole Perlroth, detailing the outstanding information security research of HD Moore and Mike Tuchen, the CSO [and Chief Architect of...
View ArticleSecurity-to-Business: Some translation required
I’ve had a lot of interest around my recent posts on how to communicate the value of information security to the business. With that in mind, I wanted to share a method used by one of the enterprises...
View ArticleHack Naked TV Episode 25
In this episode we talk about shoes.. And the people who have weird alligator shoe hangups. We also talk about insider attacks and more Offensive Countermeasures goodness. Links for this Episode:...
View ArticleWho Would Want to Take Down the Internet?
This is a question I often ask in response to those sounding the alarm that “hackers” can take down the Internet and that we all should be very worried. This is a warning I’ve seen consistently for...
View ArticleCanadian resident sentenced to death for writing a computer program
A Canadian resident has been sentenced to death in Iran for offending the faith, after his computer program was used without his knowledge to upload pornography.
View ArticleFluke Rolls Out New Threat Signatures Released To Protect Against Wireless...
New signatures protect against four attacks that can exploit wireless LANs
View ArticleWeek 3 in Review – 2012
Event Related Infiltrate Conference “Voight-Kampff’ing The BlackBerry PlayBook” at INFILTRATE 2012 – intrepidusgroup.com We gave a talk at Immunity’s awesome INFILTRATE conference in Miami Beach, FL....
View ArticleFacebook scam: the hours I spend…
I tend not to try to compete with sites like Facecrooks that specialize in tracking malware issues: however, they've just flagged a scam that has apparently already tricked arund 300,000 Facebook users...
View ArticleJudge rules decryption can be forced
The U.S. Constitution's Fifth Amendment states no one can be "compelled in any criminal case to be a witness against himself". Yet Judge Robert Blackburn has ruled in Colorado that courts can force...
View Article