What a Botnet Looks Like

Monday, May 12th, 2008

Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings. Read the rest of the story and view the map...

Free public WiFi

Monday, May 12th, 2008

I recently found myself in an airport terminal with a laptop and time to kill. Not knowing what the WiFi options were, I let Windows XP search for available wireless networks. As you can see below, one of the networks was called "Free Public WiFi". If this happens to you, ...

Metagoofil 1.4 Released – Metadata and Information Gathering Tool

Monday, May 12th, 2008

Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available on the target/victim website. It will generate a html page with the results of the metadata extracted, plus a list of potential usernames very useful for preparing a bruteforce attack on open services like ftp, pop3,web ...

New type of rootkit hidden in hardware

Monday, May 12th, 2008

Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's chip, undetected by today's anti-virus products. Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...

Mass File Injection Attack

Sunday, May 11th, 2008

We received a report from Mike this afternoon about a couple of URLs containing a malicious JavaScript that pulls down a file associated with Zlob.  If you do a google search for these two URLs, you get about 400,000 sites that have a call to this Javascript file included in ...