Archive for the 'Security' Category


Web smarts is the main defence against spyware

Tuesday, August 9th, 2005

Over at the Security Fix, Brian Krebs is talking about spyware and the fact that keeping up-to-date on patches, and running current antivirus with current definitions is not enough to protect your machine from spyware. He sums it up by saying common sense is the best defence.    Send article as PDF   

Itunes adware?

Tuesday, August 9th, 2005

It’s an older post, but I just discovered it…. July 21st… spware confidential reports on a virus masquerading as an itunes installer that actually brings along some adware (4 different applications) for fun. This apparently was distributed over the AIM messenger network.    Send article as PDF   

Homeland Security using RFID at the border

Tuesday, August 9th, 2005

Cnet news is reporting that the department of Homeland Security is using RFID at U.S. borders. The RFID chips are implanted in the “Customs and Border Protection Form I-94A” document which is used to keep track of comings and goings of foreign visitors.    Send article as PDF   

Identity theft protection and update on Massive Identity theft story

Monday, August 8th, 2005

Sunbeltblog has another update related to their earlier story about the massive identity theft ring. In this story they make clear that the keylogger was NOT directly related to coolwebsearch. It was apparently seperate and independant it was discovered during a coolwebsearch infestation, but appears unrelated.    Send article as PDF   

HP virus throttler available for Linux

Monday, August 8th, 2005

HP will be making their virus throttler software avialable for Linux. Their virus throttler software detects compromised machines on a network, mails the administrator and throttles network connections to the machine, attempting to minimize the impact of the viral outbreak. (It seems as though it would be especially useful against network worms.    Send article […]

5 must have tools for the network admin

Monday, August 8th, 2005

This multimedia presentation details five “hacker tools” that every network admin needs to be familiar with. Along the lines of “know your enemy” I think it’s important to be well versed with what tools a cracker might use to infiltrate your network.    Send article as PDF   

The state of computer security

Monday, August 8th, 2005

The Register has an interesting piece, reflecting on the current state of the computer security industry. The recent Blackhat convention has prompted this reflection and they conclude that not enough is being spent currently on computer security.    Send article as PDF   

Pay per click hijacking

Monday, August 8th, 2005

Interesting article at lurhq.com on pay per click hijacking, which is really an extension on old DNS poisoning attacks. Essentially the DNS poisoning attack works like this…    Send article as PDF   

Trifinite clarifies some points on car whisperer

Monday, August 8th, 2005

The big buzz in tech circles last week was the release of a tool called “car whisperer” which could allow someone to remotely insert audio into a bluetooth enabled vehicle. It was also possible, using the cars audio system to eavesdrop on the interior of the vehicle. Essentially, the folks at trifinite used a directional […]

Database for malware URL’s

Monday, August 8th, 2005

Incidents.org is soliciting people to submitting URL’s of malware, those addresses we get in mail that are a link to something, bad.    Send article as PDF   

Google
 
Web www.averyjparker.com