NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

9.25.2004

 
Talk about legal extortion..... I can see it now: "So what if Win2k has a hole in it? We're not going to fix it, you need to upgrade XP". Yup, it's the big kid demanding your lunch money for 'protection'. Hmm, 'upgrade' the wife's PC with Mr. Gates latest version of the beast of bugs, or buy that 250GB SATA drive I saw today? Let me put my Win2k CD back under my drink so my wife doesn't kill me for staining the table, and get back to 'upgrading' her machine from Win2k to kernel 2.6.5.......


'The box said 'Requires Windows 98 or better' so I installed Linux'



 
News from The Register:

JPEG exploit toolkit found online....

New proof of age USB token from Verisign. Yeah, Survey says the new form of fake ID on the block will be.... Here's the official link to i-SAFE

Here's a nice one on identity theft. It's nothing new, but a nice way to prove a point to the naysayers hovering around the coffee pot.

 
Study: Security measures often overlook human factor



9.24.2004

 
History of Phreaking: the Youth International Party Line AKA TAP Started in 1971



9.23.2004

 
Defense in Depth from the NSA

 
More on VXix Gigabyte from Billy

 
Timeline.Textfiles.com complements a BBS documentary that is currently in preproduction. First binary coding system? 1874. First case of telco switch hijacking? 1891. First modem? 1962. First BBS? 1978.

 
JPG Overflow PoC #3 - Local Shell Spawn

JPG Overflow PoC #4 - Add an Administrator



9.22.2004

 
ChoicePoint AutotrackXP Allows You to "Search Billions of Records from Your Computer." "Whether you're investigating fraud, conducting criminal and civil investigations, locating witnesses, finding missing children or locating and verifying assets, AutoTrackXP can deliver comprehensive information right to your desktop."

 
Ben Fry at MIT Has Some Neat Ideas for Data Visualization from Dan

 
Symantec Enterprise Firewall UDP DoS Vulnerability

 
The Phishing Guide: Understanding & Preventing Phishing Attacks from NGSSoftware

 
Attrition's Security Charlatans List

 
Hackers step up e-commerce attacks

Hack Attack Gums Up Authorize.Net

Ireland blocks calls to 13 countries to thwart Net scam

 
EPIC Maintains a Solid Collection of Privacy (Encryption) Tools

 
Arrest in Cisco Source Code Theft

 
The Complete History of the Internet. Maybe not the complete history but a valid attempt. A complete Internet & hacker history will never be obtainable since so much of the history is fragmented, unfounded and unreported.

 
References from Andy:
DOJ list of cyber crime cases

If you do not feel sorry for computer criminals read this one.

Emmanuel Goldstein, the editor-in-chief of 2600, defines hackers as someone
seeking knowledge (asking questions) and what's illegal about that?


Not only was this Virginia Beach resident stupid, but what about his
customers?


Disgruntled employee of the month.

 
K-Otik Proof of Concept Code for M$ JPG Issue

 
For those of you that need and/or want a laugh, check out this handy bike lock up for auction on ebay:

Master U-shaped Kryptonite style lock w/ two keys

Make sure you read the description and Q & A at the bottom...



9.21.2004

 
Who is Kevin Poulsen Anyway?

More Bios

 
AOL Offers RSA Key Fob OTP Authentication

 
Russian Hackers Accuse FBI of Hacking and a Background Bio on Vasiliy Gorschkov from Ronnie

 
AOL, RSA, VeriSign push authentication services



9.20.2004

 
TLC: Hacker Bios from Eric

 
Symantec Releases Newest Internet Security Threat Report

 
F-Secure reports that the Sasser Author Has Been Hired by Secure Point. Here's more from the Register.

 
The Definitive Guide to Security Management - Sign up for this free e-book from Computer Associates (link from Keith)

 
Michael Zalewski has released Fakebust, a tool aimed at automated binary analysis. If anyone tries this out, let me know how it goes.

 
Paper: Social Engineering of Internet Fraud by Jonothan Rusch, US DoJ

SecurityFocus: Social Engineering Fundamentals, Part I: Hacker Tactics and Part II Combat Strategies

 
Unsafe at Any Speed (bps) from Clyde





This page is powered by Blogger.


Site Meter Locations of visitors to this page