Hacker Launches Botnet Attack via P2P Software

Sunday, June 29th, 2008

A 19-year-old hacker is agreeing to plead guilty to masterminding a botnet to obtain thousands of victims' personal data in an anonymous scheme a federal cybercrime official described Friday as the nation's first such attack in which peer-to-peer software was the "infection point."The defendant, Jason Michael Milmont, launched the assault ...

AVG Update: Yet More Fake Traffic With New Disguises

Sunday, June 29th, 2008

In an update to our June 20th post referring to Grisoft’s AVG anti-virus product spewing fake traffic (in our opinion a flawed architecture design by the company’s CTO, Karel Obluk). Cade Metz, of The Register, has delved a bit deeper into the issue, and has discovered that over last weekend, ...

IronKey USB key has military grade encryption

Sunday, June 29th, 2008

Plenty of USB storage keys are on the market, but Ironkey is the first to use military level encryption. Sold in 1GB, 2GB, and 4GB sizes, the key features a processor called the Cryptochip, which uses Public Key Cryptography ciphers linked to an online account to create encryption keys on ...

Google Calendar Phishing

Thursday, June 26th, 2008

A couple of minutes ago an interesting attempt to phish for Google account credentials made it to my inbox. It had me blink my eyes because while I suspected phishing there were some things with this one that had me check twice to see how it’s done, as things looked ...

Zero-day flaw haunts Internet Explorer

Thursday, June 26th, 2008

An unpatched cross-domain vulnerability in Microsoft’s flagship Internet Explorer browser could expose Windows users to cookie hijacks and credentials theft attacks, according to a warning from security researchers. The zero-day flaw, which has been reported to Microsoft, is a variation of Eduardo Vela’s IE Ghost Busters talk: Do you believe in ghosts? ...