Monday, April 7th, 2008
A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including machines in the Fortune 500, according to botnet researchers at Damballa.
The so-called Kraken botnet has been spotted in at least 50 Fortune 500 companies and is undetectable in over 80 percent of ...
Posted in Networking, Privacy, Security | No Comments
Monday, April 7th, 2008
Recycling an old social engineering technique and using two different attack methods, a new spam run emerges as a threat to Web users before Microsoft’s Patch Tuesday. And not because it exploits soon-to-be named vulnerabilities.
What this spamming operation takes advantage of is the anticipation itself for the release of patches ...
Posted in Coding, Internet, Privacy, Security, Windows | No Comments
Monday, April 7th, 2008
Storm has once again turned its eye to the blogging community, specifically the Blogspot.com community.
Several blogger sites with random or very quirky names have been sporting a love theme, Storm style. These sites appear to have been created solely for Storm's purposes and no legitimate blogger site has of yet ...
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, April 6th, 2008
Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses.
Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, April 6th, 2008
Some useful syntax reminders for SQL Injection into MySQL databases...
This post is part of a series of SQL Injection Cheat Sheets. In this series, I've endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend. This helps to ...
Posted in Coding, Internet, Networking, Privacy, Security, Software | No Comments