Friday, November 20, 2009
Report: Countries prepping for cyberwar
In particular, countries gearing up for cyberoffensives are the U.S., Israel, Russia, China, and France, the says the report, compiled by former White House Homeland Security adviser Paul Kurtz and based on interviews with more than 20 experts in international relations, national security and Internet security.
"We don't believe we've seen cases of cyberwarfare," said Dmitri Alperovitch, vice president of threat research at McAfee. "Nations have been reluctant to use those capabilities because of the likelihood that [a big cyberattack] could do harm to their own country. The world is so interconnected these days."
Threats of cyberwarfare have been hyped for decades. There have been unauthorized penetrations into government systems since the early ARPANET days and it has long been known that the U.S. critical infrastructure is vulnerable."
Read the full story at CNET by Elinor Mills
Saturday, October 17, 2009
Fake antivirus attacks PCs with ransom demand
The Fake antivirus phenomenon has taken an unpleasant turn with the discovery of a Windows program that not only cons users into buying an unnecessary license but appears to lock files and applications on the victim's PC.
According to security company Panda Security, rogueware program Total Security 2009 starts out in conventional fashion with the 'discovery' of a non-existent malware infection for which it demands an unusually ambitious $79.95 (£50), and even has the cheek to ask a further $19.95 for 'premium' technical support.
Read the full story by John E. Dunn , TechWorld
Friday, October 16, 2009
Sneaky Microsoft plug-in puts Firefox users at risk
"Computerworld - An add-on that Microsoft silently slipped into Mozilla's Firefox last February leaves the browser open to attack, Microsoft's security engineers acknowledged earlier this week.
One of the 13 security bulletins Microsoft released Tuesday affects not only Internet Explorer (IE), but also Firefox, thanks to a Microsoft-made plug-in pushed to Firefox users eight months ago in an update delivered via Windows Update.
"While the vulnerability is in an IE component, there is an attack vector for Firefox users as well," admitted Microsoft engineers in a post to the company's Security Research & Defense blog on Tuesday. "The reason is that .NET Framework 3.5 SP1 installs a 'Windows Presentation Foundation' plug-in in Firefox."
The Microsoft engineers described the possible threat as a "browse-and-get-owned" situation that only requires attackers to lure Firefox users to a rigged Web site."
Wednesday, September 30, 2009
First look: Microsoft Security Essentials impresses
After a short three-month beta program, Microsoft is officially releasing Microsoft Security Essentials (MSE), its free, real-time consumer antimalware solution for fighting viruses, spyware, rootkits, and Trojans. MSE is yet another layer of defense the company is offering to help its customers fight the threats that plague Windows PCs.
Microsoft Security Essentials is available for Windows XP 32-bit (8.61MB), Windows Vista/7 32-bit (4.28MB), and Windows Vista/7 64-bit (4.71MB). The final build number is 1.0.1611.0. Microsoft warns that MSE should not be installed alongside any other antimalware application. Indeed, MSE's installer disables Windows Defender completely, which makes sense as it is a sort of superset to Windows Defender. It builds upon Windows Defender by offering both real-time protection and on-demand scanning for all types of malware."
Russian Hackers pay 43 cents per hijacked Mac
Thursday, September 17, 2009
MacForensicsLab Inc. Releases Free Tool for Investigating Crimes Against Children
MacForensicsLab Field Agent is the first and only freely available (to law enforcement) tri-platform tool designed specifically to help combat Crimes Against Children. It offers investigators a powerful yet easy to use tool with a skin tone analyzer that makes finding images of child pornography fast and easy.
The ability to quickly and effectively identify files of interest based on the percentage of skin tone contained therein makes MFL-FA an invaluable tool for law enforcement. In fact, MFL-FA was specifically designed to fill the technological gap that sexual predators have exploited for years; the lack of a fast and accurate way to identify images of evidentiary value amidst the seemingly insurmountable volume of data. Therefore, MFL-FA is perfectly suited for any Internet Crimes Against Children (ICAC) Task Force, probation and customs officers and/or any officers dealing with sexual predators. MFL-FA is the answer for all those seeking to gain the advantage over sexual predators who use technology in furtherance of their criminal acts.
Law enforcement only
To order your copy of this freeware tool please click on the "buy now" button at the bottom of this page. There is no charge whatsoever for this software but we do require the name of your agency, and some way to contact you.
You will be provided a serial number for MacForensicsLab Field Agent for Windows, Mac OS X, and Linux via email. It is therefore important to ensure your email address is input correctly.
Designed for non-technical personnel, Field Agent can be run in three easy steps; there is no rebooting, troubleshooting or complex interfaces. Utilizing the computer's USB port, it can run natively on Mac OS X, Microsoft Windows, and Linux to search suspect drives and devices. By quickly providing images relevant to an investigator's interests (typically under 2 minutes), MacForensicsLab Field Agent is an invaluable tool to all law enforcement. Field Agent has the ability to export files of interest or generate an HTML report with thumbnails, path and date information of any or all files.
Typical deployment of MFL-FA is less than two minutes per machine, making it an invaluable tool for locating data of interest and increasing officer safety. Further, MFL-FA has the ability to export files of interest or generate an HTML report with thumbnails, path and date information of any or all files.
MacForensicsLab Inc. makes Field Agent freely available to all law enforcement. To acquire a serial number for MacForensicsLab Field Agent, please submit the request form (purchase order, for a zero cost purchase, no credit cards or payment required) using a law enforcement email address. Field Agent contains just a small subset of the features available in MacForensicsLab. If you like Field Agent, checkout MacForensicsLab for the most powerful cross-platform digital forensic suite available.
How to use MacForensicsLab Field Agent
Wednesday, July 8, 2009
Cyberattacks hit U.S. and South Korean Web sites
Although the National Intelligence Service did not identify whom they believed responsible, the South Korean news agency Yonhap reported that the spy agency had implicated North Korea or pro-North Korea groups.
A spokesman at the intelligence agency said it could not confirm the Yonhap report, which said that the spy agency briefed lawmakers about their suspicions on Wednesday. The opposition Democratic Party accused the spy agency of spreading unsubstantiated rumors to whip up support for a new antiterrorism bill that would give it more power.
Read the full story in The New York Times by Choe Sang-Hun.
Friday, March 27, 2009
New worm can infect home modem/routers
The malware contains the shellcode for over 30 different Linksys models, 10 Netgear models, and a variety of other cable and DSL modems (15 different shellcodes).
A list of 6000 usernames and 13,000 passwords were also included, to be used for brute force entry to Telnet and SSH logins which are open to the LAN and sometimes even the public WAN side of the routers. Generally, routers do not lock a user out after a number of incorrect password attempts, making brute force attacks possible."
Read the full article here
Thursday, March 26, 2009
Cautionary tales from the social-networking universe

Now Facebook has made revealing personal information even easier. This past week, it announced that users can change their privacy settings so everyone can see their profile. The company was actually responding to a request from many users who wanted the ability to share their information with even more people."
Continue Reading
Friday, October 3, 2008
Credit card processors finally get clue, will ban WEP

WEP's hackability has been widely known since 2001, and has been blamed for the largest incident of consumer data theft in history. TJX, parent company of discount retailers T.J. Maxx and Marshalls, disclosed last year that hackers had stolen data covering over 45 million credit and debit cards over an 18-month period. In addition to pilfering over 45 million—and possibly as many as 200 million—credit card and debit card numbers, the hackers were also able to obtain other personal data from over 450,000 customers. This included driver's license numbers and Social Security numbers.
read more | digg story
Wednesday, April 30, 2008
Microsoft device helps police pluck evidence from cyberscene
read more | digg story