New Variant of Zeus Malware Titled “GameOver” Sent via Phishing Scam
New Variant of Zeus Malware Titled “GameOver” Sent via Phishing Scam
View ArticleIt’s 10 p.m., Do You Know Where Your Source Code Is?
Last week a hacker by the name of 'Tama Tough' claimed he was going to release the full source code for Symantec Corp's flagship product, Norton Antivirus software. With open-source software, all the...
View ArticleCisco ASDM GUI tips and tricks for managing your Cisco ASA
Cisco's Adaptive Security Device Manager (ASDM) is the GUI tool used to manage the Cisco ASA security appliances. In this blog I'll reveal to you some of my favorite tips, tricks and secrets found...
View ArticleNetwork Security Podcast, Episode 265
Unless you were hiding under a rock the last few weeks you’ve probably heard about the Stop Online Piracy Act (SOPA), Protect IP Act (PIPA) and their even more evil brother Anti-counterfiting Trade...
View ArticlePassword sharing a culture among teenage social media users
The effect culture has on security is extremely fascinating. Adoption of security policies on use or privacy are all governed in terms of adoption and effectiveness by the culture of the company or...
View ArticleBPF Filters Across Protocol Header Boundaries
BPF has keywords to address layer 3 and layer 4 protocols, such as IP, TCP, UDP and ICMP. But what if you need check the value of a field in a higher layer protocol, such as DNS? If the header you're...
View ArticleInfoSec Daily Podcast Episode 576
Episode 576 - Encryption Legally Broken, Stop Scottish Farmers!, No GPS Tracking, No OPT Out & SOPA/ACTA Hack
View ArticleSpeculative Robotics: Archetype
Directed by Aaron Sims, absolutely outstanding work; quite likely the finest short-film, speculative-science genre piece I have ever seen. ⊮
View ArticleYear Of Security for Java – Week 4 – Session Cookie HttpOnly Flag
What is it and why do I care? Session cookies (or the cookie containing the JSESSIONID to Java folks) are the cookies used to perform session management for web applications. These cookies hold the...
View ArticleHappy Anniversary to Microsoft Trustworthy Computing Initiative
Ten years ago this month, Bill Gates issued a memo to all Microsoft employees announcing the Trustworthy Computing Initiative. Development was halted for several weeks to review code and to train...
View Article"Digital Forensic SIFTing: Colorized Super Timeline Template for Log2timeline...
Last Month at the SANS360, I promised the release of the Timeline Template to be used to automatically colorize your timelines.The EXCEL TEMPLATE can be downloaded here. TIMELINE_COLOR_TEMPLATEMD5 =...
View ArticleIncite 1/25/2011 – Prized Possessions
So I’m sitting in Dunkin’ Donuts on Sunday morning, getting a few hours of work in while the kids are at Sunday school. You see the folks that come in and leave with two boxes of donuts. They are...
View ArticleTwitter acquires another security firm
Twitter is adding another layer of security to their engineering department.
View ArticleCard fraud drops as defense costs rise – criminals walk with $3.1 billion
According to a subsidiary of Visa, CyberSource, the amount of fraudulent orders online dropped to a 13-year low in 2011, but the cost of combating it is still on the rise. On top of this, successful...
View ArticleAnonymous rubbishes video clip announcing Facebook attack
Speaking through an AnonOps Twitter account that has a reliable and long-standing association with Anonymous, the group has rubbished the clip’s content and insisted it has no plans to sink...
View ArticleHacking boardroom videoconferencing systems
Videoconferencing equipment is often left wide open for hackers to creep in and peep around organizations.
View ArticleIs your smartphone telling every website you visit your telephone number?
O2 mobile users in the UK are venting on Twitter today, fuming at their discovery that their phone number is being shared with every website that they visit over the network. But users of other mobile...
View ArticleApple beats rumor numbers on Wall St. It surprised Wall Street with record...
Apple beats rumor numbers on Wall St.It surprised Wall Street with record numbers. In IT Blogwatch, bloggers try to put it all in context.#itbw $AAPLApple beats rumor numbers on Wall St.Apple did much...
View ArticleThe Internet is not Free – Carberp Targets French Broadband Subscribers
Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. We recently discovered a configuration of Carberp that targets...
View ArticleFireHost’s European-Based Secure Cloud Hosting Services Go Live
Secure hosting services are now available at data centers in London and Amsterdam
View Article