Tuesday, December 22, 2009
Facts to Know to Keep Your Computer Safe from Viruses
A virus is a computer program that is intended to do harm. A virus can delete information on your computer or use your e-mail to send viruses to other computers.
Malware is a computer program such as a Trojan Horse or a Worm.
A Trojan Horse is when a computer virus pretends to be something that it is not. EX: screen savers or computer games. If something sound too good to be true, then don’t trust it.
A Worm is a computer virus that moves through ports and uses the computer network.
A DNS code is an address that changes the number code into words so we can remember them.
A router is a device that ships and delivers information and a router switch is the same thing but it is more efficient.
If you get an unexpected email from somebody you don’t know don’t open it.
If there is an attachment to an email you can open it as long as you have the file checked with Anti-Virus protection software.
There are many ways to be protected from a virus like thru a firewall and anti-virus programs like Norton, and Mac-Updates that are already on a Mac.
Firewalls don’t accept some things because they don’t fit the criteria.
Be careful when going to game sites or other sites that let you download things because you may get a virus.
Remember, nothing is free. Beware of free stuff, programs, games, etc. that are offered on the Internet. These usually contain viruses.
Anything that connects to the internet can contact a virus this includes your cell phone and Xbox.
Friday, December 18, 2009
China Jails Trojan Virus Authors in Cybercrime Crackdown
The people, who stole login information for more than 5 million game accounts, were given prison sentences of up to three years and were fined a total of 830,000 Chinese yuan (US$120,000), China's Xinhua news agency said. Dozens of other members of the ring, which is suspected of 30 million yuan ($4.4 million) in crime, are expected to be sentenced soon, Xinhua said.
http://www.pcworld.com/businesscenter/article/184909/china_jails_trojan_virus_authors_in_cybercrime_crackdown.html
Friday, December 11, 2009
Shmoocon 2010
Different • ShmooCon is an annual East coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software & hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks, One Track Mind. The next two days, there are three tracks: Break It!, Build It!, and Bring It On!.
Affordable • ShmooCon is about high-quality without the high price. Space is limited! ShmooCon has sold out every year, so unless taking a chance on an eBay auction to get your ticket sounds like fun, register early!
Accessible • ShmooCon is in Washington, D.C., at the Marriott Wardman Park Hotel, just a few steps from the D.C. Metro. Fly into DCA, IAD, or BWI, or take a train to Union Station, and you are just a quick cab ride away from the con.
Entertaining • Brain melting from all the cool tech you are learning? Check out some of the contests running at ShmooCon, including the Hacker Arcade and Hack-Or-Halo. In years past, we have also thrown massive parties at a local area hot-spot, so expect that to happen again too!
http://www.shmoocon.org/registration.html
Thursday, December 3, 2009
BlackBerry Products PDF Distiller Code Execution Vulnerabilities
Research in Motion (RIM) issued an advisory with patches for multiple flaws in the PDF distiller service and warned and an attacker could exploit the issues by simply e-mailing a booby-trapped PDF file to a BlackBerry user.
These vulnerabilities could enable a malicious individual to send an email message containing a specially crafted PDF file, which when opened for viewing on a BlackBerry smartphone that is associated with a user account on a BlackBerry Enterprise Server, could cause memory corruption and possibly lead to a Denial of Service (DoS) condition or arbitrary code execution on the computer that hosts the BlackBerry Attachment Service component of that BlackBerry Enterprise Server.
Affected versions include the BlackBerry Enterprise Server 5.0.0 running on Microsoft Windows version 2003 or 2008, BlackBerry Enterprise Server 5.0.0 running on Microsoft Windows 2000, BlackBerry Enterprise Server software versions 4.1.3 through 4.1.7, and BlackBerry Professional Software 4.1.4.
http://blogs.zdnet.com/security/?p=5030&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ZDNetBlogs+%28ZDNet+All+Blogs%29
Tuesday, November 24, 2009
New Banking Trojan Horses Gain Polish
Traditionally, such malware stole usernames and passwords for specific banks; but the criminal had to access the compromised account manually to withdraw funds. To stop those attacks, financial services developed authentication methods such as device ID, geolocation, and challenging questions.
Unfortunately, criminals facing those obstacles have gotten smarter, too. One Trojan horse, URLzone, is so advanced that security vendor Finjan sees it as a next-generation program.
Greater Sophistication
Banking attacks today are much stealthier and occur in real time. Unlike keyloggers, which merely record your keystrokes, URLzone lets crooks log in, supply the required authentication, and hijack the session by spoofing the bank pages. The assaults are known as man-in-the-middle attacks because the victim and the attacker access the account at the same time, and a victim may not even notice anything out of the ordinary with their account.
http://www.pcworld.com/article/182889/banking_trojan_horses.html?tk=rss_news
Sunday, November 22, 2009
Microsoft Internet Explorer CSS Handling Code Execution Vulnerability (0day)
VUPEN ID : VUPEN/ADV-2009-3301
CVE ID : GENERIC-MAP-NOMATCH
CWE ID : VUPEN VNS Only
CVSS V2 : VUPEN VNS Only
Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2009-11-21
A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a dangling pointer in the Microsoft HTML Viewer (mshtml.dll) when retrieving certain CSS/STYLE objects via the "getElementsByTagName()" method, which could allow attackers to crash an affected browser or execute arbitrary code by tricking a user into visiting a malicious web page.
VUPEN has confirmed the vulnerability on fully patched Windows XP SP3 systems with Internet Explorer 7 and 6.
Affected Products
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Solution
Disable Active Scripting in the Internet and Local intranet security zones.
VUPEN Security is not aware of any vendor-supplied patch.
References
http://www.vupen.com/english/advisories/2009/3301
Tuesday, November 17, 2009
Windows SMB Subject to Denial-of-Service Attack Windows 7
Late Friday, Microsoft put out a yet another Security Advisory, saying it was looking into "new public reports of a denial-of-service vulnerability" in SMB.
The reported exploits touch SMBv1 and SMBv2 on Windows 7 and Windows Server 2008 R2 operating systems, according to the software giant.
Vista, Windows Server 2008, XP, Windows Server 2003 and Windows 2000 are not affected.
"Microsoft is aware of public, detailed exploit code that would cause a system to stop functioning or become unreliable," said Dave Forstrom, a spokesman for Microsoft Trustworthy Computing. "If exploited, this DoS vulnerability would not allow an attacker to take control of, or install malware on, the customer's system but could cause the affected system to stop responding until manually restarted."
Last Friday's advisory is the second such advisory since Redmond released one in September. This also marks the second time in as many months that news about vulnerabilities in the SMB program has emerged.
Forstrom said the default firewall settings on Windows 7 will help block attempts to exploit this latest DoS issue.
He added that while Microsoft is not currently aware of active attacks, customers should "review and implement the workarounds outlined in the advisory until a comprehensive security update is released."
http://mcpmag.com/articles/2009/11/16/windows-smb-subject-to-denial-of-service-attack.aspx
Friday, October 30, 2009
New Vulnerabilities Microsoft / Adobe
This remote code execution exploit takes advantage of a vulnerability
in Microsoft .NET Framework when processing certain code e.g. in
a XAML browser application (XBAP).
CVE ID: CVE-2009-0091
* Adobe Reader U3D Clod Declaration Code Execution Exploit (APSB09-15)
This code execution exploit takes advantage of an array indexing
vulnerability in Adobe Reader when processing U3D Clod Declarations
within a PDF file.
CVE ID: CVE-2009-2994
* Microsoft Internet Explorer Remote Memory Corruption PoC (MS09-052)
This code demonstrates a memory corruption vulnerability in Microsoft
Internet Explorer when processing certain HTML elements.
CVE ID: CVE-2009-2531
Tuesday, October 27, 2009
Mozilla Firefox Code Execution and Information Disclosure Vulnerabilities
which could be exploited by attackers to manipulate or disclose
certain data, bypass security restrictions or compromise a vulnerable
system.
The first issue is caused by an error within the form history, which
could allow malicious web sites to trick a vulnerable browser into
auto-filling form fields with history entries and then reading the
entries.
The second vulnerability is caused due to a predictable file naming
scheme being used to download a file which already exists in the
downloads folder, which could allow an attacker with access to a
vulnerable system to place a malicious file in the world-writable
directory used to save temporary downloaded files and cause the
browser to open it.
The third issue is caused by a memory corruption error within the
processing of recursive web-worker calls, which could be exploited to
crash an affected browser or execute arbitrary code.
The fourth vulnerability is caused by a memory corruption error within
the parsing of regular expressions used in Proxy Auto-configuration
(PAC) files, which could allow attackers to crash an affected browser
or execute arbitrary code on a system where PAC has been configured
with specific regular expresssions.
The fifth issue is caused by a heap overflow error in the GIF image
parser, which could be exploited to crash an affected browser or
execute arbitrary code.
The sixth vulnerability is caused due to the XPCOM utility
"XPCVariant::VariantDataToJS" unwrapping doubly-wrapped objects before
returning them to chrome callers, which could result in chrome
privileged code calling methods on an object which had previously been
created or modified by web content, leading to the execution of
malicious JavaScript code with chrome privileges.
The seventh issue is caused by a heap overflow error in the string to
floating point number conversion routines, which could be exploited to
crash an affected browser or execute arbitrary code.
The eighth vulnerability is caused due to a same-origin policy bypass
via the "document.getSelection" function, which could be exploited to
conduct cross-domain scripting attacks.
The ninth vulnerability is caused by an error when downloading a file
with a name containing a right-to-left override character (RTL), which
could be exploited to obfuscate the name and extension of a malicious
file to be downloaded and opened.
The tenth issue is caused by memory corruption errors in the
JavaScript and browser engines when parsing malformed data, which
could be exploited by attackers to crash a vulnerable browser or
execute arbitrary code.
Other memory corruption errors related to liboggz, libvorbis, and
liboggplay have also been reported, which could be exploited by
attackers to compromise a vunerable system.
Affected Products
Mozilla Firefox versions prior to 3.5.4
Mozilla Firefox versions prior to 3.0.15
Monday, October 19, 2009
DHS Web sites vulnerable to hackers, IG says
“These vulnerabilities could put DHS data at risk,” Skinner wrote in the report issued Oct. 8. “In addition, DHS can make improvements in managing its system inventory and providing technical oversight and guidance in order to evaluate the security threats to its public-facing Web sites.”
Read More...
Wednesday, October 14, 2009
Snow Leopard bug deletes all user data
The bug, users said in a well-read thread on Apple's support forum, resets all settings on the Mac, resets all applications' settings and erases the contents of critical folders containing documents, photos and music.
The MacFixIt site first reported the problem more than a month ago.
Read more...
Wednesday, September 30, 2009
Typhoon Ondoy Victims, Philippines
You tube video
Friday, September 18, 2009
Zeus is the #1 botnet ?
log onto a list of targeted banks and financial institutions, and then steals
their credentials and sends them to a remote server in real time.
Additionally, it may inject HTML into the pages rendered by the browser,
so that its own content is displayed together (or instead of) the genuine
pages from the bank’s web server. Thus, it is able to ask the user to
divulge more personal information, such as payment card number and
PIN, one time passwords and TANs, etc.
Zeus uses some rootkit techniques to evade detection and removal.
Zeus is the #1 botnet, with 3.6 million PCs infected in the US alone (i.e.
approximately 1% of the PCs in the US)
Read More...
Friday, September 4, 2009
eBay reaches deal to sell Skype
EBay will keep a 35% stake in the firm, which it has been trying to sell for some time. It has said that Skype had "limited synergies" with it.
Read more...
Wednesday, September 2, 2009
Trojan Targets Skype Users
Read more
Magic numbers in files
Some examples:
* Compiled Java class files (bytecode) start with hex CAFEBABE. When compressed with Pack200 the bytes are changed to CAFED00D.
* GIF image files have the ASCII code for "GIF89a" (47 49 46 38 39 61) or "GIF87a" (47 49 46 38 37 61)
* JPEG image files begin with FF D8 and end with FF D9. JPEG/JFIF files contain the ASCII code for "JFIF" (4A 46 49 46) as a null terminated string. JPEG/Exif files contain the ASCII code for "Exif" (45 78 69 66) also as a null terminated string, followed by more metadata about the file.
* PNG image files begin with an 8-byte signature which identifies the file as a PNG file and allows detection of common file transfer problems: \211 P N G \r \n \032 \n (89 50 4E 47 0D 0A 1A 0A). That signature contains various newline characters to permit detecting unwarranted automated newline conversions, such as transferring the file using FTP with the ASCII transfer mode instead of the binary mode.
* Standard MIDI music files have the ASCII code for "MThd" (4D 54 68 64) followed by more metadata.
* Unix script files usually start with a shebang, "#!" (23 21) followed by the path to an interpreter.
* PostScript files and programs start with "%!" (25 21).
* PDF files start with "%PDF" (25 50 44 46).
* Old MS-DOS .exe files and the newer Microsoft Windows PE (Portable Executable) .exe files start with the ASCII string "MZ" (4D 5A), the initials of the designer of the file format, Mark Zbikowski. The definition allows "ZM" (5A 4D) as well but this is quite uncommon.
* The Berkeley Fast File System superblock format is identified as either 19 54 01 19 or 01 19 54 depending on version; both represent the birthday of the author, Marshall Kirk McKusick.
* The Master Boot Record of bootable storage devices on almost all IA-32 IBM PC Compatibles has a code of AA 55 as its last two bytes.
* Executables for the Game Boy and Game Boy Advance handheld video game systems have a 48-byte or 156-byte magic number, respectively, at a fixed spot in the header. This magic number encodes a bitmap of the Nintendo logo.
* Zip files begin with "PK" (50 4B), the initials of Phil Katz, author of DOS compression utility PKZIP.
Friday, August 21, 2009
VA IG finds abuse of authority and ethical breaches in IT office
IG investigations of the conduct of people in the IT office substantiated the claims of ethical violations, according to two heavily redacted reports released Aug. 18.
Read more...
Thursday, August 13, 2009
Microsoft ordered to stop selling Word
* Aug 12, 2009
"A federal court in Texas has ordered Microsoft to stop selling Microsoft Word.
Judge Leonard Davis of the U.S. District Court for the Eastern District of Texas, Tyler Division, ruled yesterday in favor of Toronto-based i4i, stating that Microsoft unlawfully infringed the Canadian company’s patent.
At a jury trial that began on May 11, representatives for i4i said that Microsoft’s use of Word 2007 for processing XML documents with custom XML elements “willfully” infringed i4i’s Patent 449.
The ruling prohibits Microsoft from selling or importing to the U.S. any Word products that have the capability of opening XML, .DOCX or DOCM files that contain custom XML.
The ruling is set to go into effect in 60 days. The judge has also granted an award and damages of $290 million to i4i."
More on FCW's
Monday, August 10, 2009
More attacks on Facebook, YouTube, adn Fotki
The attack included at least these components:
• DDoS attack against Cyxymu's Twitter account (http://twitter.com/cyxymu)
• DDoS attack against Cyxymu's Youtube account (http://www.youtube.com/cyxymu)
• DDoS attack against Cyxymu's Facebook account (http://www.facebook.com/cyxymu)
• DDoS attack against Cyxymu's Livejournal account (http://www.livejournal.com/cyxymu and http://cyxymu1.livejournal.com)
• DDoS attack against Cyxymu's Fotki account (http://public.fotki.com/cyxymu/)
• An e-mail "Joe Job" campaign against Cyxymu
The effects of some of these attacks are still visible. For example, Livejournal and Facebook are still not accepting connections to Cyxymu's pages.
More on F-Secure..
Thursday, July 16, 2009
Nmap 5.00 is Out
Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks made easy with Ncat.
The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners.
Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition.
The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features.
Visit and download the new version @ http://nmap.org/5/#changes-nse
Monday, July 13, 2009
Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution
We are aware of attacks attempting to exploit the vulnerability.
Our investigation has shown that there are no by-design uses for this ActiveX Control in Internet Explorer which includes all of the Class Identifiers within the msvidctl.dll that hosts this ActiveX Control. For Windows XP and Windows Server 2003 customers, Microsoft is recommending removing support for this ActiveX Control within Internet Explorer using all the Class Identifiers listed in the Workaround section. Though unaffected by this vulnerability, Microsoft is recommending that Windows Vista and Windows Server 2008 customers remove support for this ActiveX Control within Internet Explorer using the same Class Identifiers as a defense-in-depth measure.
Read more...
Monday, July 6, 2009
Microsoft warns of hole in Video ActiveX control
There have been limited attacks exploiting the hole, which affects Windows XP and Windows Server 2003, Microsoft said on its Security Response Center blog.
This is the second DirectShow security hole Microsoft has announced in the past few months. The company has yet to provide a security update for a vulnerability announced in May that involves the way DirectX handles QuickTime files."
Thursday, July 2, 2009
US job losses worse than expected
The number of jobs lost in the US last month came in at 467,000, which was much more than had been expected.The jobless rate rose to 9.5% in June, from 9.4% in May, as the US economy continued to struggle.
Since the start of the recession in December 2007, the number of jobless people has risen by 7.2 million, the Department of Labor said.
The unemployment rate was slightly lower than had been expected, but was still the highest since August 1983.
In its separate weekly jobs report, the Department of Labor said that the number of newly laid-off workers applying for employment benefits last week fell to 614,000, while the number of people continuing to claim benefits unexpectedly fell to 6.7 million.
Read more...
Wednesday, July 1, 2009
Kon-Boot
Read more...
Tuesday, June 30, 2009
Snort Setup Guide
The document is posted at: http://www.snort.org/docs/setup-guides/
Saturday, June 6, 2009
Virginia patients warned about hacking of state drug Web site
The Virginian-Pilot
© June 4, 2009
State officials are notifying more than a half-million Virginians that their Social Security numbers may have been contained in a prescription drug database that was targeted by a computer hacker April 30.
The hacker gained access to the Prescription Monitoring Program computer system, which is designed to deter prescription drug abuse, and demanded a $10 million ransom. The hacker has not been identified.
A criminal investigation has not yet determined what, if any, personal information was put at risk in the incident, said Sandra Whitley Ryals, director of the Virginia Department of Health Professions, on Wednesday.
Nevertheless, the state is mailing individual notifications to 530,000 people whose prescription records may have contained Social Security numbers, in order to alert them to the potential for identity theft, Ryals said.
Read more...
Monday, June 1, 2009
Tory MP hacked on Facebook
According to reports, the MP fell foul of a phishing campaign that stole his username and password, and hackers then sent messages to Fabricant's 1,500 friends saying "Look at this!" and pointing recipients to a malicious webpage. Facebook has now suspended the politician's page.
Read more...
Saturday, May 30, 2009
Critical Windows vulnerability under attack, Microsoft warns
Microsoft has warned of a critical security bug in older versions of its Windows operating system that is already being exploited in the wild to remotely execute malware on vulnerable machines.
The vulnerability in a Windows component known as DirectX is being targeted using booby-trapped QuickTime files, which when parsed can allow attackers to gain complete control of a computer. Because many browsers are designed to automatically play video, people can be compromised simply by visiting a site serving malicious files. Vista, Windows Server 2008 and the beta version of Windows 7 are not affected, and neither is Apple's QuickTime player, Microsoft said.
Read more...
Thursday, May 21, 2009
NARA suffers data breach
Wednesday, May 13, 2009
Tools and Config: Configuring Squid Proxy
http://www.labtestproject.com/linnet/squid_proxy_server.html
Monday, May 11, 2009
Hacker demands $10M ransom for data
A hacker who claims to have stolen 8 million records from a database that tracks prescription drug abuse in Virginia is demanding a $10 million ransom for the information's return, according to media reports.
"I have your s@*t! In *my* possession, right now, are 8,257,378 patient records and a total of 35,548,087 prescriptions," the WikiLeaks note reads. "Also, I made an encrypted backup and deleted the original. Unfortunately for Virginia, their backups seem to have gone missing, too. Uhoh :("
Read more...
Will Craigslist Have to Crack Down?
South Carolina joins other states in calling for tighter Craigslist ad scrutiny, which could threaten Craigslist's low-cost, laissez faire business model he pressure is on Craigslist to clean up its act. If the online classified ad site doesn't remove a section devoted to erotic services in South Carolina by May 15, the state's attorney general, Henry McMaster, says he'll open a criminal investigation into the company's executives, including Chief Executive Jim Buckmaster. Read more...
Craigslist founder Craig Newmark Chip Somodevilla/Getty Images
Wednesday, May 6, 2009
Cyberwarfare unit operating out of North Korea?
Monday, April 27, 2009
ATM PAYMENT DEPARTMENT,IMMEDIATE ORDER FOR YOUR PAYMENT
****
OFFICE OF THE HEAD OF SENATE
FEDERAL REPUBLIC OF NIGERIA
COMMITTEE ON FOREIGN PAYMENT
(RESOLUTION PANEL ON CONTRACT PAYMENT)
ATM PAYMENT DEPARTMENT
IKOYI-LAGOS NIGERIA
Urgent Beneficiary,
This is to officially inform you that we have verified your inheritance file and found out that why you have not received your payment is because you have not fulfilled the obligations given to you in respect of your inheritance payment.
Secondly we have been informed that you are still dealing with the none officials in the bank your entire attempt to secure the release of the fund to you. We wish to advise you that such an illegal act like these have to stop if you wish to receive your payment this week since we have decided to bring a solution to your problem. Right now we have arranged your payment through our swift card payment center Asia pacific that is the latest instruction from MR. PRESIDENT, ALHAJI UMARU YAR’ADUA (GCFR) FEDERAL REPUBLIC OF NIGERIA. AND EFCC NIGERIA As well the INTERPOL and FBI.This card center will send you an ATM CARD which you will use to withdraw your money in any ATM MACHINE in any part of the world, but the maximum is twenty thousand dollars per day, so if you like to receive your fund this way please let us know by contacting the card payment center: contact person DR DANIEL WATAC:My Direct Telephone Phone number+234-80-50685399
email address:danielwatac.watac@
And also send the following information:
1. Your full name
2. Phone and fax number
3. Address were you want them to send the atm card
4. Your age and current occupation
5. Attach copy of your identification
The ATM CARD PAYMENT CENTER has been mandated to issue out $4,000,000.00 as part payment for this fiscal year 2009. Also for your information, you have to stop any further communication with any other person(s) or office(s) to avoid any hitches in receiving your Payment. For oral discussion, call and email me back as soon as you receive this important message for further direction and also update me on any development from the above-mentioned office.
Note that because of impostors, we hereby issued you our code of conduct, which is (ATM-822) so you have to indicate this code when contacting the card center by using it as your subject.
Best Regards.
YOUR PAYMENT AGENT,
Dr. DAVID MARK
SENATE PRESIDENT
(Federal Republic of Nigeria)
****
Saturday, April 25, 2009
Facebook users say yes to changes
Wednesday, April 15, 2009
Tech Review: Kanguru e-Flash drive
The Kanguru e-Flash is the Clark Kent of flash drives. It looks ordinary at first but use it to transfer a gigabyte or two of data and you’ll realize that it almost has super powers. The interesting aspect of its design is that it has a USB port on one end of the key drive, and an eSATA port on the other. Read more...
Wednesday, April 8, 2009
Tips: Vi Editor Usage
:q! abort without saving
:wq write changes and quit
a append text after cursor
i insert text before cursor
o open a new line below current line
O open a new line above current line
x delete character
dd delete line
1p restore most recently deleted text at cursor
u undo last change (repeat to undo undo)
10G go to line 10 (can use any line number)
G go to last line
0 move to beginning of current line
$ move to end of current line"
Tuesday, April 7, 2009
What's the point of security certs?
We have heard from a number of readers who see little value in requiring cybersecurity workers to have security-related industry certifications.
They were responding to our report about a Senate bill that would require contractors to license and certify anyone providing cybersecurity-related services to a federal agency.
Several of these readers are not impressed specifically with Certified Information Systems Security Professional (CISSP) certifications. But certification, in general, is a bit of a red herring they said, because it does not reflect work experience, which is more valuable than test experience.
Blog Results:
* I've been certified since 2003 and have contact with many "certified" folks who have no experience with actual skills on the job. The cost of getting certified is high for both individuals and companies, yet the government still wants to award to the low bidder. Companies can't afford to spend a lot of money and not get a return on their investment in the people. It is also very difficult to retain trained 'professionals' no matter if they are trained while under government sponsorship or by their company. There is a lot of job hopping to increase salaries without remaining long enough to actually learn/perfect skills or truly contribute to the agency's mission.
* Great. Another worthless paper certification. And I include CISSP in that. Took me 45 minutes to parse the exam questions for the correct answers to pass that test then ISC2 wanted "maintenance" fees throughout the 3 year certification period. Those fees were not disclosed when I got the CISSP cert. Now I have to pay the "overdue" fees to re-certify since the 3 years ended. WTF? ISC2 is just about the money and they are going to exploit this one for all it's worth.
Monday, April 6, 2009
Phishing E-mail
Dear Client,
Your VISA account has expired. You must renew it immediately or your account will be closed. If you intend to use this service in the future, you must take action at once!
To continue (link) login to your VISA account and follow the steps.
Thank you for using VISA!
VISA Services DEP.
COPYRIGHT VISA Solutions 2009 (C)
*******************
High level analysis
The site (v001.nexlink.ch) contains a script that contains credit card and PIN code validator.
Site per whois
inetnum: 80.86.200.0 - 80.86.203.255
netname: CH-NEXLINK-NET3
descr: green.ch AG Brugg Switzerland
descr: Shared Hosting
country: CH
Tuesday, March 31, 2009
Job Offer Scams
Good tidings to you as you read.
Please permit me to write you irrespective of the fact we have not met before. I got your contact through network online
hence I decided to write you. I would be very interested in offering you a part-time paying job in which you could earn up to $7,000 a month as extra
income. opening an account would have been my best choice if I was not working on a deadline that must meet a 24 hour turn around time, other options are
not on my side due to time, money, and requirements. This is why I am offering a part time opportunity to someone responsible who can supply prompt assistant
and service. JOB DESCRIPTION: Work as my payment assistant in charge of collecting and processing the payments from the associates.
1. Receive payment (inform of money orders/checks) from my Clients/Associates.
2. Cash the Payments at your Bank
3. Deduct 10%, which will be your percentage/pay on Payment processed.
4. You will then forward the balance via Western Union Money Transfer
according to my instruction. REQUIREMENT: 18 years or older. Responsible, Reliable and Trustworthy Available to work a minimum 3-4 hours per week. Able to
check and respond to emails often. Easy telephone access. IS THIS LEGAL? YES It is very legal, Doing this job is 100% safe and legal. I would be glad if
you accept my proposal for an opportunity to make up 10% of each transaction completed. Please reply via email with complete information as requested:
A. NAME,==============
B. STREET ADDRESS (NOT P.O BOX),=================
C. CITY:=========================
D. STATE:========================
E. ZIP CODE==========================
F. COUNTRY=======================
G. MOBILE NUMBER, ====================
H. AGE, ==============================
I. SEX, ==============================
J. OCCUPATION====================
K. E MAIL==========================
All replies should be sent to dr.davidewalk1@gmail.com
Regards,
DR David Walker
Monday, March 30, 2009
Conficker Tools
Felix Leder and Tillmann Werner
The following page contains the tools and analysis results described in our "Know your Enemy" paper "Containing Conficker - To Tame a Malware". The paper is published by the Honeynet Project and can be downloaded here: todo
All tools are to be considered as proof of concepts. Even though most of them run stable, they are not meant for use in production. They don't come with any warranty.
All tools are available including source code and are licences using GPL.
http://iv.cs.uni-bonn.de/wg/cs/applications/containing-conficker/
Friday, March 27, 2009
Nmap 4.85BETA 4
4.85BETA4 (compared to 4.76) includes our new Ncat and Ndiff tools, a ton of new NSE scripts for superior network discovery, more than 5,000 version detection signatures and nearly 2,000 OS fingerprints, improved scan performance, and much more! You can read about all the changes at http://nmap.org/changelog.html. Be sure to read all the way down to 4.85BETA1, as that includes some of the most dramatic changes.
Thursday, March 26, 2009
Firefox critical vulnerability patched in 3.0.8, due next week
Wednesday, March 25, 2009
Beware of "Local Breaking News"
March 16, 2009 (Marshal News)
Over the past month, botherders have been using fake coupon websites to host Waledac malware. Today, these criminals have updated their theme to use "Reuters breaking news" with localized content to easily captivate unwary users. It uses IP geolocation services to achieve content localization which we have mentioned before in our previous blog. As usual, a link from the fake website point to a Waledac binary and to make it more legitimate looking, "Related Links" to Wikipedia and Google Search were added. Read more...
Tuesday, March 24, 2009
Senator says his office computers were hacked
Thursday, March 12, 2009
Linux Tips: Removing Directory
Remove folder(s), if they are empty.
SYNTAX
rmdir [options]... folder...
OPTIONS
--ignore-fail-on-non-empty
ignore each failure that is solely because the directory is non-empty
-p, --parents remove explicit parent directories if being emptied
--verbose output a diagnostic for every directory processed
--help display this help and exit
--version output version information and exit
Related Linux Bash commands:
ls - List information about files (use ls-al to see if they are empty)
rm - Remove files (rm -rf will recursively remove folders and their contents)
Wednesday, March 11, 2009
Michael Jackson and Green Card lottery scams come together
"At the bottom you'll see a banner advert inviting people to live and work in the USA. The advert is served up by a division of Jackson's record company, Sony BMG, who themselves get it from an advertising network called Advertising.com. Nothing bad or dangerous so far.
But what I'm especially interested in is what happens when you click on the advert. You get taken to a website called www.usafis.org, which offers you the opportunity to enter the lottery for an American Green Card (essentially the authorisation to live and work in the United States).".
Posted on March 11th, 2009 by Graham Cluley, Sophos
Tuesday, March 10, 2009
Recent exploits evade Adobe's countermeasures; patch not ready
Last week, a researcher who works at the Danish vulnerability tracker Secunia said he had come up with an exploit that didn't rely on JavaScript. Read more..
More about Conficker Worm
Read More ...
Thursday, March 5, 2009
Configuring LILO
LILO is the Linux Loader, the most popular boot loader for Linux. It is used to load Linux into memory and start the operating system. On a machine with multiple operating systems, LILO can be configured to boot the other systems as well.
Normally LILO is initially configured for you during the Linux installation process. However, you may find that default configuration is not correct, or you wish to customize it. And there may even come a time when you need to remove LILO from your computer. Here are some instructions that should help you on your quest.
Tuesday, March 3, 2009
Friday, February 27, 2009
Tuesday, February 24, 2009
Starbucks sued after laptop data breach
Sunday, February 22, 2009
Conficker B++?
Read more on SRI's Analysis Report
Friday, February 13, 2009
IPhone Jailbreak hack Violates Law
February 13, 2009 (Computerworld) Hacking an iPhone is against the law, Apple Inc. has argued in comments filed with the U.S. Copyright Office.
According to the Electronic Frontier Foundation (EFF), a freedom-of-speech advocacy organization, this is the first public statement from Apple about its legal position on "jailbreaking," the term used to describe hacking an iPhone to install third-party applications not sold via Apple's own App Store. Read more...
Heartland Data Breach
Thursday, February 12, 2009
New Vulnerability Found in Blackberry's
Feb 11, 2009 | 05:29 PM
By Tim WilsonDarkReading
Just a few weeks after President Obama won his fight to keep his BlackBerry, the handheld's security is causing concern again.
BlackBerry maker Research In Motion this week is warning users about a newly discovered vulnerability that could potentially enable an attacker to gain remote control of the device or crash its browser.Read More...
Work around and Fixes
http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB16248
Tuesday, February 10, 2009
FAA files hacked... again
Hackers have once again gained entry to the US Federal Aviation Administration's (FAA's) computers.
Tom Waters, president of union Local 3290, and an FAA contract attorney, revealed that FAA officials told union leaders that hackers had gained entry to 48 files. Two of them may have provided the bad guys with names and social security numbers of 45,000 employees and retirees. However, another file they got their hands on, which contained medical information, was encrypted. Read more...
Monday, February 9, 2009
ShmooCon '09
Read more...
Wednesday, February 4, 2009
Federal Workers Notified After SRA Virus Breach
February 03, 2009 — IDG News Service — Employees at federal security agencies are being notified that their personal information may have been compromised after hackers planted a virus on computer networks of government contractor SRA International.
SRA began notifying employees and all of its customers after discovering the breach recently, company spokeswoman Sheila Blackwell said Tuesday. The malicious software may have allowed hackers to get access to data maintained by SRA, including "employee names, addresses, Social Security numbers, dates of birth and health care provider information," the company said in a notification posted at the Maryland Attorney General's Web site. Read more...
Monday, February 2, 2009
Symbian trojan steals money from mobile accounts
Thursday, January 29, 2009
IEC Web Site Compromised
Taps vs Span Ports
- Taps free SPAN ports for tactical, on-demand monitoring, especially intra-switch monitoring. Many switches have only two ports capable of SPAN, and some offer only one. If you commit a SPAN port for permanent monitoring duties, and you need to reassign it for some sort of troubleshooting on a VLAN or other aspect of the traffic, you have to deny traffic to your sensor while the SPAN port is doing other work. Keep your SPAN ports free so you can do intra-switch monitoring when you need it.
- Taps provide strategic, persistent monitoring. Installing a tap means you commit to a permanent method of access to network traffic. Once the tap is installed you don't need to worry about how you are going to access network traffic again. Taps should really be part of any network deployment, especially at key points in the network.
- Selected taps do not permit injected traffic onto the monitored link. Depending on the tap you deploy, you will find that it will not be physically capable of transmitting traffic from the sensor to the monitored link. This is not true of SPAN ports. Yes, you can configure SPAN ports to not transmit traffic, and that is the norm. However, from my consulting days I can remember one location where I was told to deploy a sensor on a box with one NIC. Yes, one NIC. That meant the same NIC used for remote SSH access also connected to a switch SPAN port. Yes, I felt dirty.
- What taps see is not influenced by configuration (as is the case with SPAN ports); i.e., what you see is really what is passing on the link. This is key, yet underestimated. If you own the sensor connected to a SPAN port, but not the switch, you are at the mercy of the switch owner. If the switch owner mistakenly or intentionally configures the SPAN port to not show all the traffic it should, you may or may not discover the misconfiguration. I have seen this happen countless times. With a network tap, there's no hiding the traffic passing on the monitored link. Many shops have been surprised by what is traversing a link when the finally take a direct look at the traffic.
- Taps do not place traffic on a switch data plane, like a SPAN port does. This point is debatable. Depending on switch architecture, SPAN ports may or may not affect the switch's ability to pass traffic. By that I mean a SPAN port may not receive all traffic when the switch is loaded, because forwarding may take precedence over SPANning.
The Veterans Affairs Department has agreed to pay $20 million
Wednesday, January 28, 2009
How-to Install Snort on Ubuntu 8.10
http://baronne.mouton.co.uk/snort-on-ubuntu-server-810-intrepid-ibex/
Tuesday, January 27, 2009
Serious security alert for Monster.com and USAJobs.gov users, Sophos reports
Job websites struck by hackers once again, putting identities at risk
IT security and control firm Sophos is advising all users of careers website Monster.com and USAJobs.gov, the official job site of the US Federal Government, to change their passwords following news that both sites have been the victim of a serious hacking attack which has compromised both and usernames and passwords.
Furthermore, as research has discovered that 41 percent of people use the same password for every website they access, many Monster and USAJobs users are likely to be at risk of their accounts on other websites are at risk of being hacked. Read more...
Obama smartphone conforms to military standards
The Sectera Edge is actually a re-purposed Palm Treo 750 that has been reconfigured to send and receive wireless classified e-mail messages and attachments, as well as access Web sites on the government’s Secure IP Router Network (SIPRnet). It features a single-touch button that permits authorized users to toggle between SIPRnet and government’s non-secure network, NIPRnet. And it would allow the president to have secure voice conversations. Read more...
My personal opinion. I think L-3 guardian is much better.
http://www.l-3com.com/cs-east/ia/smeped/ie_ia_smeped.shtml
Sunday, January 25, 2009
Hoax that claims Apple CEO Steve Jobs has had a heart attack
"A widely-circulated URL which points to an image that purports to be a wired.com story about Steve Jobs health is a hack job," Wired.com said. "We won't provide the URL here but the Twitterverse quickly surmised that the item was not correct." It appears to have first been reported by Mashable.
Someone created a legitimate-looking Web page using Wired's public upload image viewer, which generates a page containing an image under a Wired logo banner, Wired.com said. The hole has been patched, the news site added. Read more...
Friday, January 23, 2009
Trojan Attack Masquerades as E-ticket notice
Jan 22, 2009 | 05:19 PM
By Tim WilsonDarkReading
Security researchers have spotted a new attack designed to fool users into thinking that airline tickets have been purchased with their credit cards.
The attack, which was first spotted as an email from Northwest Airlines, and subsequently as a message from United Airlines, is a realistic-looking "receipt" that contains an attachment bearing the name Your_ETicket.zip or eTicket.zip, according to researchers at security vendor Sophos. Read more...
Wednesday, January 21, 2009
To disclose or not to
Cheap cracks
ARIZONA MAN INDICTED FOR SELLING COUNTERFEIT SOFTWARE ON EBAY
Friday, January 16, 2009
Preemptive Blocklist and More Downadup Numbers
The number of Downadup infections are skyrocketing based on our calculations. From an estimated 2.4 million infected machines to over 8.9 million during the last four days. That's just amazing. Read more...
Wednesday, January 14, 2009
RealVNC 4.1.2 'vncviewer.exe' RFB Protocol Remote Code Execution Vulnerability
An attacker can exploit this issue to execute arbitrary code in the context of the vulnerable process. Failed exploit attempts are likely to result in denial-of-service conditions.
This issue may be related to the vulnerability discussed in BID 30499 (RealVNC 4.1.2 'vncviewer.exe' Remote Denial of Service Vulnerability).
RealVNC 4.1.2 is vulnerable; earlier versions may also be affected.
Read more...
Tuesday, January 13, 2009
Serious security vulnerability in Safari web browser reported
Monday, January 12, 2009
Mysterious credit card charge may have hit millions of users
CheckFree warns 5 million customers after hack
Friday, January 9, 2009
F-Secure Warns about a new Worm
Typical problems generated by the worm include locking network users out of their accounts. This happens because the worm tries to guess (or brute-force) network passwords, tripping the automatic lock-out of a user who has too many password failures.
more technical details
Thursday, January 8, 2009
Friendster Users Beware!!!
Wednesday, January 7, 2009
-
In 2013 Android grew to a very large number: 87%. This was its share of the global smartphone market. It also grew to an even larger one: 97...
-
Pretty neat tool for iOS devices! iVerify is an integrity validator for iOS devices capable of reliably detecting modifications such as mal...
-
ICMP TYPE NUMBERS (last updated 2008-02-13) Registries included below: - ICMP Type Numbers - Code Fields - ICMP Extension Objects Classes Th...