Wednesday, April 23rd, 2008
CAPTCHAs are becoming both ubiquitous and useless. When you visit many web sites, you have to decipher some tough-to-read text and enter it in a box before you can leave a comment or send an email. But hackers are getting better and better at developing automated systems to crack CAPTCHAs, ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, April 23rd, 2008
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P', automatically generate an exploit for the potentially unknown vulnerability present in P but fixed in P'. In this paper, we propose techniques for automatic patch-based exploit generation, and show that our ...
Posted in Coding, Linux, Security, Windows | No Comments
Wednesday, April 23rd, 2008
The number of online threats will have grown tenfold by the end of 2007, according to researchers at anti-malware firm Kaspersky.
Kaspersky analysts said at Infosec Europe 2008 that new malicious programs recorded on the internet, including viruses, worms and Trojans, amounted to 2.2 million in 2007, representing a fourfold increase ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, April 23rd, 2008
Our columnist shows you how to get rid of spyware, shrug off spam, and stay safe on unsecured public networks.
Viruses, spyware, and worms. Oh, my!
We all know the dangers inherent in accessing the Internet, and we all take precautions. Yet our PCs still occasionally get infected because we can't know ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 22nd, 2008
Following a friendly heads up from someone yesterday morning, I re-loaded the
following Kraken samples into my honeypot:
1d51463150db06bc098fef335bc64971
65b958bf6f5eddca3d9455354af08b6f
6ec7d67d5553cbec2a99c7fbe385a729
7ecef2f126e66e7270afa7b803f715bc
8fd8c67103ec073d9303a7fbc702f89a
and began monitoring them. Each sample proceeded to update itself;
the updated binary is around 160KB, given a random name and
placed in the system32 directory, and no longer has an imagefile icon.
The names/MD5 values of ...
Posted in Coding, Internet, Privacy, Security | No Comments