• Sophos bloggers at the RSA Conference

    Updated: 2010-02-26 15:37:18
    Sophos will be out in force at the RSA Conference in San Francisco next week, giving you the opportunity to see our products in action and meet (amongst others) bloggers Paul Ducklin, Chet Wisniewski and err.. me. Topically enough, considering everything that has been going on this week, I'll be giving presentations and demonstrations about threats [...]

  • UK Cabinet Minister Ed Miliband hacked on Twitter

    Updated: 2010-02-26 10:47:00
    Ed Miliband MP, the high profile British Secretary for Energy and Climate Change, has fallen victim to the current swathe of phishing attacks sweeping the Twitter system. Mr Miliband, who is a member of Gordon Brown's cabinet, appears to have been careless with his computer security and handed his Twitter username and password over to hackers, [...]

  • Flirty phishing? 24/female/horny has just Twitter-spammed you

    Updated: 2010-02-26 08:26:19
    Plenty of Twitter users must be finding the spate of spam and phishing attacks that have plagued them this week pretty tedious by now. The latest message being spammed out claims to come from a young woman: hi, i'm 24/female/horny... i have to get off here but message me on my windows live messenger name <username>@hotmail.com Hilariously, this [...]

  • Software, All the Way Down

    Updated: 2010-02-25 22:50:31
    In general, Windows does a decent enough job with securing software keys in CAPI. Sure, you can open up Windows Explorer, browse to C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys, and take a look at your private key files. These bare files, of course, are not exactly plain text. The RSA Machine Keys (which include private keys corresponding [...]

  • Guest blog: Educate your users about social networking threats with our free toolkit

    Updated: 2010-02-25 16:27:54
    Sally in the marketing department has put together a really handy package, which will help you educate your users about social networking threats. And the best news of all is that it's completely free! Tell us all about it Sally.. Hi, I'm Sally Adam from the Sophos marketing team and I'm hijacking Graham's blog to [...]

  • Sea World killer whale attack video leads to malware

    Updated: 2010-02-25 13:49:52
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with [...]

  • Guest blog: Beta test upcoming Sophos products

    Updated: 2010-02-25 10:41:07
    Camera-phobic guest blogger Kim Charlton, who manages the beta program at Sophos, wants to bribe you into helping us improve our products. Over to you Kim.. It's beta time again and I am once again on the lookout for people to trial our latest offerings. This time I have two beta programs running almost concurrently (I obviously [...]

  • This you???? : Phishing attack hits Twitter users

    Updated: 2010-02-24 10:56:04
    There is another widespread phishing attack hitting users of Twitter today. Messages asking "This you????" followed by a link are being sent via the system to unsuspecting users. If you click on the link you are taken to a fake Twitter login page, where hackers are just waiting for you to hand over your credentials. [...]

  • Return of the MAC

    Updated: 2010-02-24 03:14:20
    Message Authentication Codes (MACs) are special pieces of data used to prove the authenticity and integrity of a message– to show that the message originated from a certain source and that it has not been modified. Consider a scenario in which Alice wants to send Bob an email. Upon receiving the email, Bob would like [...]

  • Obscurity Still Isn’t Security

    Updated: 2010-02-23 20:25:33
    Today Slashdot had a story about how a news story about an Australian transportation plan was broken early by a newspaper. The transport minister said the access of this information was akin to the newspaper trying to “pick the lock off a secure office and take highly confidential documents”.  What was the brilliant security plan [...]

  • On Olympics, St. Patrick’s Day, Screensavers, and Wallpaper

    Updated: 2010-02-23 19:30:43
    The combination of search engine optimization with sporting and holiday news continues to fascinate me. Oh, and did I mention malware and malicious websites? They always make for interesting bedfellows. The Olympics have been getting massive coverage, of course, and St. Patrick’s Day is just around the corner. We can count on these events to provide [...]

  • Vote for your favourite security blogger

    Updated: 2010-02-23 16:21:21
    Those terribly nice folks at SC Magazine are running a number of online polls on their homepage in the run-up to their awards ceremony at the RSA Conference. The poll for the most popular security blogger caught my eye in particular.. :) Seriously, there are some awesome security bloggers listed there, and even being shortlisted in such [...]

  • FTC notifies almost 100 organisations of P2P data leaks

    Updated: 2010-02-23 15:57:55
    The Federal Trade Commission has notified close to 100 US organisations of serious P2P-related security breaches that have exposed consumers to the risk of identity theft and fraud. The use of P2P file-sharing networks to download music and movies opens the door for data loss both in the office and on consumers' personal PCs, when [...]

  • Surveillance rootkits on smartphones

    Updated: 2010-02-23 14:11:59
    Liviu Iftode and Vinod Ganapathy, two researchers at Rutgers University, have revealed some experiments they have been conducting, showing how rootkits could be used to take control of smartphones. The scientists have shown that a malicious attacker could cause a smartphone to "eavesdrop on a meeting, track its owner’s travels, or rapidly drain its battery to [...]

  • Dumb Ideas in Pentesting

    Updated: 2010-02-22 05:22:18
    Today's SANS Diary reminded me of something that happened a while back. The SANS entry New Risks in Penetration Testing was concerned that reputational scoring for an IP could be effected by pen testing from that IP address. I guess someone is taking the old Senderbase concept and applying it to all traffic. The helpdesk received an issue a while back about an inability to communicate with a government website. After checking it out, it looked like they were blocking our external IP. We communicated with the government people and confirmed that their ISS IPS appliance had automatically blocked our IP because we were attacking them. I checked the logs and found that one of our people that pentests for a living had done some probing of XSS on a Wordpress blog hosted on the government site. I turned that over to someone else to find out if he had authorization to be doing such. Probing other companies from your companies main IP address is not such a good idea.

  • Firefox Updates

    Updated: 2010-02-18 04:18:30
    Firefox 3.5.8 and Firefox 3.0.18 have been released to resolve several security vulnerabilities.

  • Dear Abby on Password Secrecy

    Updated: 2010-02-18 01:28:33
    Today's Dear Abby contained a letter about passwords. Its the third letter at this link The letter writer warns against sharing your passwords with anyone. The writer recounts instances where a password shared at one point in a relationship becomes a weapon when the relationship turns sour. People, after the divorce is finalized you need to make sure your ex doesn't have your bank passwords. Didn't expect to be getting security advice from Dear Abby. If these people had followed the standard security advice to use different passwords for each account and change them regularly that alone would have prevented this breach.

  • FIPS and why everyone cares

    Updated: 2010-02-16 11:44:20
    FIPS stands for Federal Information Processing Standards, and is “run” by NIST. It is a set of standards that dictates how information is stored, processed, and managed in the federal government. It’s also leaked into the commercial sector through government contractors and the concept of “If it’s good enough for the government…” Almost all [...]

  • Google Buzz, Privacy, and You

    Updated: 2010-02-12 19:33:54
    An uproar was recently started in reference to some privacy concerns about the new release from Google, Google Buzz. One of the first to sound the alarm was a blogger who was quite explicit about disliking some of its default options (and by explicit I mean “NSFW language” explicit, the post is here) which prompted [...]

  • Security Advisory for Adobe Reader, Acrobat and Flash

    Updated: 2010-02-12 01:00:34
    Adobe has released a Security Advisory for Adobe Reader and Acrobat (APSB10-07). Adobe is planning to release updates on 2/16/2010 to resolve critical security issues. Adobe has released a security update for Adobe Flash and Adobe AIR

  • Kingsoft Internet Security will attend DTE Expo in Athens- April 16-18, 2010

    Updated: 2010-02-11 09:50:09
    Kingsoft Internet Security will attend DTE Expo in Athens- April 16-18, 2010

  • Valentine’s Day Searches Lead to Malware

    Updated: 2010-02-10 17:11:13
    5, 4, 3, 2, 1…malware! It’s like clockwork, ain’t it? A popular holiday–such as Valentine’s Day–approaches and malware authors and cybercriminals ready for it. I have done some Valentine’s Day searches for poisoned terms and found some nasty ones very quickly. Screensavers and ecards are always popular: Even Rolex watches on Valentine’s Day are not safe: Some [...]

  • Kingsoft, Dell to Announce Cooperation

    Updated: 2010-02-10 06:49:53
    Kingsoft, Dell to Announce Cooperation

  • Don’t Disregard the Insider

    Updated: 2010-02-09 15:52:56
    When companies create security policies designed to keep their information secure, they are often most focused upon the threat of an outsider.  Certain measures, like using secure protocols such as SSL and TLS, or using S/MIME encrypted email can help keep your information from being viewed by third parties when it is sent over untrusted [...]

  • McAfee Labs Quarterly Threat Report Posted

    Updated: 2010-02-09 13:06:37
    Today we unveiled our Threats Report for the fourth quarter of 2009. It highlights many of the most significant spam-generating stories in 2009 as well as the rise of political hacktivism in countries such as Poland, Latvia, Denmark, and Switzerland. The report’s findings also reveal that 2009 averaged approximately 135.5 billion spam messages per day; [...]

  • Common Sense

    Updated: 2010-02-09 01:23:59
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for Common Sense By Roger on February 8, 2010 8:23 PM 4 Comments No TrackBacks Does anyone really think that sneezing into your arm is common sense I suspect that if you do you must have small kids and have been trained by some sort of Elmo video . I dont recall any mass agreement on sending snot flying into my shirt sleeve as a method of good . hygiene At Shmoocon Bruce Potter compared the common sense of sneezing into your sleeve to him apparently a good thing with common sense security steps . Maybe he's right , a password policy is kind of like getting snot all over . yourself My notes seem to have mangled the opening remarks from Shmoocon 2010. The general summary is that its a waste to spend a boatload of money on security when you dont have your policies and procedures clear . You've got to start with the . basics A password

  • Dave Marcus: Ready for an Oscar

    Updated: 2010-02-08 20:22:53
    As a rule, we don’t do product plugs on this blog for obvious reasons. This is the place for research and data on threats and responses. But we’re going to make an exception to bring you a video from Dave Marcus, the guy who keeps the McAfee Labs blog running, and runs a couple dozen [...]

  • Unicorn sighting

    Updated: 2010-02-07 05:15:46
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for Unicorn sighting By Roger on February 7, 2010 12:15 AM No Comments No TrackBacks A few weeks ago my officemate posted to , Facebook I've just been told by two different Mac Geniuses that installing an antivirus software could actually make the Mac computer less secure . Unfortunately , both were phone conversations because I'm almost certain they were doing the Jedi mind trick hand . motions As I read that , I figured this was Mac users in our company fighting our policy requiring antivirus for Macs . Certainly antivirus can slow a system . And any software can have vulnerabilities . But this wasn't about that . No this was actual honest to god responses from Apple support . My officemate wanted to know if this was official policy . So he asked for it in writing . That got him escalated to the next level where he was

  • Shmoocon versus the Snowpocalypse

    Updated: 2010-02-06 15:38:24
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for Shmoocon versus the Snowpocalypse By Roger on February 6, 2010 10:38 AM No Comments No TrackBacks Shmoocon is this weekend . The city is starting to look like something from The Day After Tomorrow I live in the DC suburbs , and had considered grabbing a hotel room to take part in what has to be the crazyest Shmoo ever . The hotel rates when I checked online were lower than the Shmoo rate . But then I'd still have to pay a insane rate for hotel garage parking . And the Donner party jokes were worrying me too . I could see the hotel running out of food and everything else being . closed I drove into Ballston on Friday . In December Metro closed the above ground stations without a lot of warning . I knew they'd do it again if snow got to 8 inches , Ballston is the last underground station on the Orange line . Metro didn't close the

  • Kingsoft Internet Security Wins Major Awards

    Updated: 2010-02-05 08:14:10
    Kingsoft Internet Security Wins Major Awards

  • OpenVAS

    Updated: 2010-02-04 11:00:03
    Nessus is a nice tool, but some people have complained and revolted against it because it went closed source in version 3.0. I’m sure there were good reasons for that, but if – for whatever reason – you don’t want to use Nessus, what can you use? Enter OpenVAS. I’ve mentioned OpenVAS before, but [...]

  • It’s time to move past IE6, isn’t it?

    Updated: 2010-02-03 17:31:14
    We have recently taken a look at Internet Explorer 6 (IE6) to try and help convince a customer of ours to stop deploying it on workstations.IE6 still holds about 33% of the browser market share, but Microsoft stopped mainstream support for it in April of 2009.  IE6 runs ActiveX controls at the same privilege as [...]

  • Protecting Privacy by Design

    Updated: 2010-02-02 20:04:43
    This guest post was written by Benjamin Edelman, Assistant Professor at Harvard Business School and an advisor to McAfee. Last week I revealed troubling transmissions by the Google Toolbar: Even when a user specifically “disable[s]” the Google Toolbar, and even when the Toolbar disappears from view, the Toolbar continues tracking users online behavior—including specific web [...]

  • Hackers Disrupt European CO₂ Market

    Updated: 2010-02-02 19:27:29
    In recent weeks, various cybercrime attacks have disrupted the computer systems that allow nations to manage their national greenhouse-gas emissions quotas and their possession of carbon assets according to international agreements (the Kyoto Protocol and the European system). One quota is the right to emit the equivalent of one ton of carbon dioxide during a specified period. The [...]

  • Be careful on help files

    Updated: 2010-02-02 08:38:40
    The other day, I came across a malware that attempts to hide its infection not in that technical but in the very unique way. “Muster” is a family of backdoor which has been using help files for hiding themselves. The help files or “.hlp” files are data files designed to be viewed with Microsoft WinHelp browser [...]

  • January Patches

    Updated: 2010-02-02 01:29:03
    Roger's Information Security Blog Hi , welcome to my blog . It started out as a place to be able to post links and news so I could find them again . I began adding my own commentary , and its proven surprisingly popular . Thanks for stopping by . Dont forget to use the search if Google dropped you off at this page and you dont see what you're looking . for January Patches By Roger on February 1, 2010 8:29 PM No Comments No TrackBacks After a fairly light December patching load , January took no prisoners . Microsoft's patch Tuesday had just one patch , MS10-001. But they made up for that with an out of band update later in the month MS10-002. They also put out a bulletin warning about old flash . installs Adobe and Oracle piggybacked on patch Tuesday to release updates as well . Vendors pretend its more convenient for people to get all their patches at once , but Its more about losing their own vulnerability announcements in the crowd . Adobe Reader is installed on most machines , so deploying Reader and Acrobat updates is kind of a big . deal To keep admins on their toes , Adobe also released security updates for Shockwave and . Illustrator Real Player kept its name in the news

Current Feed Items | Previous Months Items

Jan 2010 | Dec 2009 | Nov 2009 | Oct 2009