Researchers dive into memory dumps

Monday, March 31st, 2008

Building on earlier research into cold-boot attacks on computer memory, two consultants showed off their prototype tools for grabbing passwords from untended computers, during a session at the CanSecWest conference last week. The consultants -- Sherri Davidoff and Tom Liston, both of security firm Intelguardians -- found that numerous Windows and ...

Stormy April Fool’s Day

Monday, March 31st, 2008

A wave of April Fool's Day related Storm mails have just been sent out. Similar as the other times with a link that points to an IP address.

Shedding (Black)Light on the Master Boot Record

Monday, March 31st, 2008

A while ago we blogged about the MBR rootkit, which has been getting attention from all the security vendors. We're glad to inform you that the latest version of the F-Secure BlackLight standalone rootkit scanner now detects MBR rootkit infections. BlackLight has stood the test of time ever since it was ...

Wireshark 1.0 Released

Sunday, March 30th, 2008

"I'm proud to announce the release of Wireshark 1.0. This is the culmination of nearly ten years of hard work by a team of brilliant and talented developers. It is an honor to be able to work with these people. On behalf of the development team, I would like to thank ...

Phishers Use Google to Find Exposed Servers

Sunday, March 30th, 2008

Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor. Among other activities, MarkMonitor tracks phishing attacks that target brand names. Researchers compiled a list of 750 Google search terms that are used to track down ...