Monday, May 12th, 2008
Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings.
Read the rest of the story and view the map...
Posted in Internet, Privacy, Security | No Comments
Monday, May 12th, 2008
I recently found myself in an airport terminal with a laptop and time to kill. Not knowing what the WiFi options were, I let Windows XP search for available wireless networks. As you can see below, one of the networks was called "Free Public WiFi". If this happens to you, ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Monday, May 12th, 2008
Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available on the target/victim website.
It will generate a html page with the results of the metadata extracted, plus a list of potential usernames very useful for preparing a bruteforce attack on open services like ftp, pop3,web ...
Posted in Internet, Privacy, Security | No Comments
Monday, May 12th, 2008
Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's chip, undetected by today's anti-virus products.
Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...
Posted in Hardware, Privacy, Security | No Comments
Sunday, May 11th, 2008
We received a report from Mike this afternoon about a couple of URLs containing a malicious JavaScript that pulls down a file associated with Zlob. If you do a google search for these two URLs, you get about 400,000 sites that have a call to this Javascript file included in ...
Posted in Internet, Privacy, Security | No Comments