Web Users in Malware Crosshairs

Wednesday, April 9th, 2008

Online malware attacks are becoming more pervasive, targeted, and refined as the underground threat economy continues to evolve and take on the characteristics of an organized industry. The latest iteration of Symantec's Internet Security Threat Report -- covering its research over the final six months of calendar 2007 and released on ...

Top botnets control 1M hijacked computers

Wednesday, April 9th, 2008

Storm is a shadow of its former self, Kraken is just another name for Bobax and the biggest botnet goes by the mouthful of "Srizbi," a noted botnet researcher said today as he released the results of his census of the various armies of hacked computers that spew spam. Joe Stewart, ...

Bypass Proxy Services

Wednesday, April 9th, 2008

Many schools, companies and organizations these days use Internet filtering software to block certain websites from access. However, for every one of these blocking tools, there is a work around for savvy users that want to see the content. It's not that difficult to bypass MySpace filters and other similar ...

Why Your Computer Runs So Slowly

Wednesday, April 9th, 2008

The first thing I suspect when someone tells me that their PC is running slowly is that they may be dealing with adware or spyware. Typically, a computer infected with this type of malware will display other symptoms as well. Odd behavior such as pop-up ads, your internet home page ...

ProxyStrike – Background SQL Injection and XSS analysis

Wednesday, April 9th, 2008

The folks over at Darknet do a great job of pointing out interesting tools for use in penetration testing and web app security testing among other things. I won’t be duplicating their feed here, but when I see something that I want to test for myself, I will be posting ...