Tag Archives: malware

Safely Check Bad URLs

If you’re looking for a way to safely check URLs for bad content, Lenny Zeltser had a great list of free online tools for you.

Continue reading

Leave a comment

Filed under Free, How to..., Security, Technology

Creating and Selling Zero-day Exploits

Bruce Schneier has written about and compiled some great info and links regarding the market for creating and selling zero-day exploits in his Crypto-Gram newsletter.

Here’s some highlights:

Continue reading

Leave a comment

Filed under Security

Internal Attacker Detected: Part 1

A while back when I worked in IT security, an internal attacker popped up on our radar…

I answered the phone and heard a tech from the anti-malware team say, “I think we have a problem, Mack. Got some time to come down and see what I found?”

Continue reading

3 Comments

Filed under Case Files, Security, Security Scout

How Bot Net Trends are Changing

Bot net trends are changing, according to an Information Week article.  Tim Wilson notes the following:

  • Overall, bot net activity is picking up after a late 2010 lull.
  • Large bot nets will be aggressive in capturing more computers for their kingdom.  Bot  nets will attempt to steal seats from their competition, patching the computers they take over so to defend themselves against other thieves.
  • Social networks are becoming the command points for bot nets.
  • Similar to the SETI programs where you can donate some of your computer’s processing capacity to search for alien intelligence, some bot nets are becoming opt-in so that you can participate in politically-based bot net activity.
  • Small botnets are becoming used more effectively, as they are harder to detect.

Read all about it at Botnets Coming Roaring Back in New Year.

Leave a Comment

Advertisement

Leave a comment

Filed under Security

Shipley on Security Spend

Greg Shipley, founder of Neohapsis, wrote an article in Information Week magazine, this time about how ineffective most of the money spent on security defenses is against the attacks we’re facing.  It’s not a short article, but as I’ve said before, Shipley is always worth reading. Here’s what I found most interesting in the article:

  • “Deficiencies, even in our security technologies, are an unfortunate fact of life,” says Shipley.

Continue reading

Leave a comment

Filed under Security

How to Avoid Friendly Infections

I love to “steal” content and blog post ideas from others (usually AuditMonkey), but this time, I slim-fingered from Mister Reiner (check out his computer security and hacking blog at misterreiner.wordpress.com).

All I really stole were the ideas inspired by a comment that I left on his post entitled, Your friends and relatives can go home and jack up their own computer. Reiner wrote that allowing others on your computer might result in an infected PC if your friends and relatives do stupid things like surf porn or open email attachments. To avoid these issues, he suggested you do the following:

Continue reading

Leave a comment

Filed under How to..., Security

Great Security Cheatsheets (Free)

Lenny Zeltser not only created some great security cheatsheets, he compiled a list of some good reference guides developed by others.

Why should you trust his FREE cheatsheets? Lenny leads a security consulting practice, teaches malware analysis, explores security topics at conferences and in articles, and volunteers as an incident handler at the Internet Storm Center.

So whether you want to learn more about specific security practices or just have a quick reference, you’ll want these cheatsheets.

Continue reading

Leave a comment

Filed under Audit, Free, How to..., Security

ECards and Email Privacy

Most security-savvy users are aware of the problems with electronic greeting cards, which may contain malicious software.  Like almost all emails that I receive with a subject containing “FW:” (forward), I delete all greeting cards (eCards) that I receive, even those from Mom.

If you’re like me, you warn your friends and family about the dangers of emailed greeting cards (they just aren’t worth the risk). But what about the other issue with greeting cards?

Continue reading

Leave a comment

Filed under Security