Archive for the 'Security' Category


Cyberextortion

Monday, August 8th, 2005

The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article.    Send article as PDF   

Australia to ask Google Maps to pull images over security concerns

Monday, August 8th, 2005

According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It’s worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services like MSN’s Virtual Earth and […]

Huge identity theft ring discovered by spyware research

Monday, August 8th, 2005

Sunbelt blog, reports that they have uncovered a MASSIVE amount of personal data, ranging from usernames to passwords to banking information and much more while investigating spyware. They found keylogger transcript software with lots of personal information. Sunbelt develops software to protect against spam and spyware and other security threats. A keylogger is software that […]

Monad will not be in Windows Vista

Friday, August 5th, 2005

I wrote earlier about “proof of concept” viruses that targeted Monad, the next generation command shell from Microsoft. There had been talk that Monad would ship with Windows Vista and so some people were saying these “proof of concept” virii were the first to target Vista. Well, according to the Microsoft Security Response Center Blog […]

Mail Viruses Junk Spam Phishing and now Dark?

Friday, August 5th, 2005

Okay, I’ve seen a new term come across the horizon in the battle of the email inbox. First there were viruses, then junk mail, which became known as Spam and then Phishing attacks now we’re up to DarkMail. According to scmagazine , an IT security focused publication, the earmarks of darkmail are similar to junkmail […]

Wireless ethernet security

Friday, August 5th, 2005

Flexbeta has an article giving a good primer on the different approaches to wireless security that are currently available and what seems to be on track for the next generation of wireless networking. One thing that is worth noting, if it’s transmitted through the air it can be intercepted. Breaking the code is just a […]

Suspicious Emails inderectly leading to virus infection

Friday, August 5th, 2005

According to The August 4th entry of the isc.sans.org handlers diary, there are some peculiar emails going around. They claim to be for an article claiming an explosion kills 140 in Iraq. It contains a link to a news article that has been altered from it’s original (140 instead of 14 for instance.) It also […]

Windows 2000 Worm vulnerability

Friday, August 5th, 2005

Apparently, there is an unpatched vulnerability in Windows 2000 that could open the door for a network worm. The details have not been released to give Microsoft time to deal with a patch. (Microsoft is drawing down support commitments to 2000, releasing a batch of updates just before their timeline to start phasing out support.) […]

Microsoft to release 6 updates Tuesday August 9th

Friday, August 5th, 2005

According to this release, expect to see 6 updates coming out from Microsoft Tuesday. One will be tagged critical from what I read. It seems like this is a bit large number this time around, but still it could be worse, prepare for patching.    Send article as PDF   

Windows Vista virus

Friday, August 5th, 2005

I know I saw this yesterday somewhere (The Register?), but….. According to this article, proof of concept viruses have already been written for Monad, which is Microsoft’s next revision of the command shell. Now, there is some hesitance to call these viruses the first that would affect Windows Vista because it’s not known when Monad […]

Google
 
Web www.averyjparker.com