Wednesday, January 7th, 2009
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Specs:
Free, independent service
Use of multiple antivirus engines
Real-time automatic updates of virus signatures
Detailed results from each antivirus engine
Real time global statistics
You can also email your file ...
Posted in Internet, Security, Software | No Comments
Tuesday, January 6th, 2009
An 18-year-old hacker with a history of celebrity pranks has admitted to Monday's hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama's, and the official feed for Fox News.
The hacker, who goes by the handle GMZ, told Threat Level on Tuesday he gained entry to Twitter's administrative control panel ...
Posted in Coding, Internet, Privacy, Security | No Comments
Tuesday, January 6th, 2009
According to this eWeek article, Google has been named the #3 spam provider in the world according to the most recent Spamhaus Statistics.
They are stating the reason as "Spammers have had success cracking the CAPTCHA tests and creating Gmail accounts from which to spam. Because the spam comes from a ...
Posted in Internet, Privacy | No Comments
Tuesday, January 6th, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Tuesday, January 6th, 2009
The economic lifecycle of the underground fraud community functions very similarly to the world of legitimate business. Online fraudsters have supply chains, third-party outsourcers, vendors, and online forums where people with skills and people with opportunities to commit fraud can find each other. The underground fraud supply chain is becoming ...
Posted in Internet, Privacy, Security | No Comments