Sunday, June 29th, 2008
A 19-year-old hacker is agreeing to plead guilty to masterminding a botnet to obtain thousands of victims' personal data in an anonymous scheme a federal cybercrime official described Friday as the nation's first such attack in which peer-to-peer software was the "infection point."The defendant, Jason Michael Milmont, launched the assault ...
Posted in Internet, Networking, Privacy, Security | No Comments
Sunday, June 29th, 2008
In an update to our June 20th post referring to Grisoft’s AVG anti-virus product spewing fake traffic (in our opinion a flawed architecture design by the company’s CTO, Karel Obluk). Cade Metz, of The Register, has delved a bit deeper into the issue, and has discovered that over last weekend, ...
Posted in Internet, Privacy, Security | No Comments
Sunday, June 29th, 2008
Usually, I don't have two calls for packets on a shift, but this one definately bears looking into and hopefully finding an answer. There is an increase on port 502, when you look at the targets, that started today. Till today, life has been pretty quiet on that ...
Posted in Internet, Security | No Comments
Thursday, June 26th, 2008
A couple of minutes ago an interesting attempt to phish for Google account credentials made it to my inbox. It had me blink my eyes because while I suspected phishing there were some things with this one that had me check twice to see how it’s done, as things looked ...
Posted in Internet, Privacy, Security, Software | No Comments
Thursday, June 26th, 2008
An unpatched cross-domain vulnerability in Microsoft’s flagship Internet Explorer browser could expose Windows users to cookie hijacks and credentials theft attacks, according to a warning from security researchers.
The zero-day flaw, which has been reported to Microsoft, is a variation of Eduardo Vela’s IE Ghost Busters talk:
Do you believe in ghosts? ...
Posted in Coding, Internet, Privacy, Security, Windows | No Comments