Tuesday, May 31, 2005
WiFi Security That Really Works
Monday, May 30, 2005
Time's Up, Einstein
Sunday, May 29, 2005
U.S. military tries to solve identity theft with Boca-based cyber technology
Saturday, May 28, 2005
Why it's smart to disobey officials in emergencies
Friday, May 27, 2005
Top-Heavy Tart Rips off More Than Her Shirt
The jiggly sexpot, known to the adult world simply as Farrah, but to police as Joy Marquart, 30, was busted at a Washington Mutual branch in Emerson on Monday after a teller realized her drivers' license was a fake, authorities said.
The bodacious blonde had successfully fooled tellers at other banks, in Emerson, Fair Lawn, Hackensack, Oradell, Ridgewood and Westwood in recent months, said Emerson Police Detective Sgt. George Buono. Each haul netted $6,000 to $7,500, he said.
But investigators believe the top-heavy tart was merely a gorgeous face fronting for a Big Apple-based identity-theft ring that recruited attractive, white, suburban-looking women to rip off bank accounts.
"She isn't the mastermind by any stretch of the imagination," Buono said.
Taking actual customers' names and account numbers, the thieves fashioned fake IDs with Marquart's mug on them, along with phony checks and debit cards, so that she could make withdrawals, Buono said.
Marquart was being held at the Bergen County Jail yesterday on theft charges in lieu of $105,000 bail.
Police are searching for Marquart's accomplices and were trying to figure out how they got hold of people's information.
DHS flunks test - CIA plays games
ZombieMeter keeps track of hacked PCs
Thursday, May 26, 2005
Touch-Screen Voting
Here's the abstract:
Intel Releases Pentium 4 with Dedicated Virus Coprocessor
Wednesday, May 25, 2005
Russian Business will Pay to Spread Spyware
Tuesday, May 24, 2005
Whoppix 2.7 Final (may18-0340.iso)
George you might enjoy this- Metasploit Meterpreter Demo
OK, Dan you can watch also...
Monday, May 23, 2005
Systm episode #1
Sunday, May 22, 2005
Hacker Hunters - An elite force takes on the dark side of computing
A large portion of the article is dedicated to describing the global scope of such activites with Russia, Eastern Europe and China leading the ranks for criminal hideouts.
Saturday, May 21, 2005
Google Tools for Automated Hacking Tests
Friday, May 20, 2005
Phishers Turn DNS Servers Against Authorities
Thursday, May 19, 2005
How To Crack WEP - Part 2: Performing the Crack
BSA: One Third of All Software Pirated
Wednesday, May 18, 2005
Honeynet KYE: Phishing paper Published
The paper is available here:
Armadillo Crashes MoD Network
A popular video spoof caused Ministry of Defense computers to crash, including those at Britain's secret strike command headquarters in Buckinghamshire.
Computer screens controlling British air defenses and warplanes around the world are reported to have gone blank for five hours.
"We couldn't believe it when the screens went blank," said one RAF officer at the MoD in Whitehall. "After several hours of staring at nothing we went to the pub and then went home early. But it would have been extremely serious if some big operation had been on the go."
Tuesday, May 17, 2005
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
Breaking Firewalls with OpenSSH and PuTTY
This article shows how remote Linux and Windows users can gain access to firewalled samba, mail, and http servers. In essence, it shows how openSSH and PuTTY can be used as a VPN solution for your home or workplace, without monkeying with the firewall.
This article is NOT suggesting you close port 22. These step are only possible given valid accounts on all servers. But, read on, you may be surprised what you can do, without punching additional holes through the firewall -- punching additional holes is a bad idea.
Monday, May 16, 2005
Spouses Using Spyware To Find Evidence Of Cheating
These days, for better or worse, some folks are finding they don't need to hire a private eye to do the snooping. As CBS 2's Susan McGinnis found out, they just let their fingers do the stalking.
Peta Rhinehart remembers the best moments of her marriage. She also remembers the worst: when her husband cheated on her, with one of her best friends. "I was broken hearted, I was angry - I raged," she said.
Rhinehart was devastated, but determined. "If he was going to be that deceiving, I was going to be also and that's when I purchased the spyware, put it on the computer," she said. Rhinehart installed surveillance software to monitor her husband's online activities. Within minutes she saw every keystroke, website, email, even intimate chats he had with other women.
Identity-Theft Humor
Arizona Man Steals Bush's Identity, Vetoes Bill, Meets with Mexican President
WASHINGTON, DC--Confusion and disbelief reigned at the White House after President Bush announced Monday that an Arizona man, known to authorities only as H4xX0r1337, stole his identity and used it to buy electronic goods, veto a bill, and meet with Mexican President Vicente Fox.
"This is incredibly frustrating," Bush told reporters Tuesday. "Not only does this guy have my credit-card information, he has my Social Security number, all my personal information, and the launch codes for a number of ballistic intercontinental nuclear missiles. I almost don't want to think about it."
For those readers who don't know, The Onion publishes fake funny news items.
Sunday, May 15, 2005
Shoplifters use aluminum to foil store security
Professional shoplifters, he said, have used aluminum-lined shopping bags, strollers, backpacks, trench coats, girdles and pants in order to steal high-dollar items for more than two decades. "It's still one of the easiest ways to defeat the system," Mr. LaRocca said. County police saw that firsthand May 4 when they nabbed two men outside Westfield Annapolis allegedly using aluminum-lined "booster bags" to steal more than $9,000 in women's and children's clothing. "It looked like a regular shopping bag," said Cpl. Fred Reynolds, the arresting officer. He said several layers of aluminum foil were taped to the inside of a plastic bag and that a white bag was taped on top of that to mask the foil. "Whoever made this is serious aboutcrime. They are not just a kleptomaniac," Cpl. Reynolds said.
Saturday, May 14, 2005
Friday, May 13, 2005
Happy Friday the 13th and goodbye to Riggs Bank.
Not sure how this one will turn out, but I do know I will miss Riggs...
Oh, and here’s a link to why everyone else is afraid of Friday the Thirteenth.
http://people.howstuffworks.com/friday-thirteenth.htm
Thursday, May 12, 2005
Poachers turn over Microsoft Gatekeeper security test
The Gatekeeper Test was an entertaining test of wits for security pros: A series of progressively trickier multiple choice questions. Security experts from 20 countries in Europe, the Middle East and Africa were to compete with their compatriots, with a Tablet PC awarded to the the best in each country. The overall winner was to get a VIP trip to Microsoft's TechEd conference in Amsterdam this July. There were even league tables so you could compete with your mates. So what could possibly go wrong?
Wednesday, May 11, 2005
How To Crack WEP – Part 1: Setup & Network Recon
Tools Used
* Auditor's Security Collection - Contains all the wireless hacking tools already installed
* Kismet
Worm makes a monkey out of gullible email readers.
The Wurmark-K worm spreads as an email attachment in emails with subject lines such as "Your Photo Is On A Webpage!!". If recipients open the attached ZIP file and launch the files inside (with names such as Sexy_02.scr or Lover_01.scr) on Windows machines they become infected by the worm and a graphic of an albino gorilla is displayed. As the image is rendered, Wurmark-K installs the Rbot-ABK network worm and backdoor Trojan horse, enabling hackers to subsequently steal information from an unsuspecting user or plant other malicious code.
Graham Cluley, senior technology consultant for Sophos, said the gorilla picture is displayed only after a machine becomes infected. The tactic would lead people to believe the email was just a joke, he added.
Although the Wumark worm presents a very serious security threat it's found few takers so far. Most anti-virus vendors rate it as a low risk. In any case it makes sense for surfers to protect their PCs behind personal firewalls and up-to-date anti-virus software.
Tuesday, May 10, 2005
REAL ID Act
If you haven't heard much about REAL ID in the newspapers, that's not an accident. The politics of REAL ID is almost surreal. It was voted down last fall, but has been reintroduced and attached to legislation that funds military actions in Iraq. This is a "must-pass" piece of legislation, which means that there has been no debate on REAL ID. No hearings, no debates in committees, no debates on the floor. Nothing.
This week in tech
Note: also available as a mp3
Monday, May 09, 2005
ATM 'skimming' fraud
Talwinder Khubar Singh, 19, is suspected of obtaining the account and personal identification numbers of 18 customers at a Bank of America branch in Elmont with Rajwinder Brar, 27, of Richmond Hill, when a witness called authorities, police said.
Police said Singh installed the computerized skimming device over the ATM's insert port to read and download the information from the magnetic strip of each card that is swiped. He would then transfer that information onto blank cards, police said.
Singh obtained the personal identification numbers by attaching a small camera over the keypad and recording as people entered their PINs, police said.
Saturday, May 07, 2005
Kensington Lockpicking
In this video a guy demonstrates just how easy it is to open a Kensington laptop lock using a roll of toilet paper, tape, and a pen. It's really scary to know that a roll of toilet paper is all that it takes for someone to take your laptop...
Friday, May 06, 2005
Your Identity, Open to All
ZabaSearch queries return a wealth of info sometimes dating back more than 10 years: residential addresses, phone numbers both listed and unlisted, birth year, even satellite photos of people's homes.
By Xeni Jardin at Wired.
Lessons of the ChoicePoint Theft
A nice essay (The Five Most Shocking Things About the ChoicePoint Debacle) about the implications of the ChoicePoint data theft (and all the other data thefts, losses, and disclosures making headlines).
Thursday, May 05, 2005
Password cracking and recovery
As computer processors get faster, security upgrades to existing software are needed in order to provide better protection against these types of attacks. Many users don't always use the most secure passwords in trade for ease to remember and often they can be cracked with even the simplest tools available. False sense of security is common when it comes to password selection and if you think yours is good enough you might be surprised to find out how easy it can be cracked.
Execs Testify In Favor Of National Data-Security Law
Executives from companies stung by losses or theft of customer information vowed Wednesday [04/05] to do more to safeguard sensitive information and backed a federal law to require disclosure if customer data is compromised.
In prepared testimony for a hearing by the House Committee on Financial Services, executives from Bank of America, ChoicePoint, and LexisNexis supported legislation patterned after California's law requiring companies to notify customers about security breaches.
Wednesday, May 04, 2005
Hacking a SQL Server
Tuesday, May 03, 2005
(IN)SECURE Magazine
From the HNS folks, a freely available, freely distributable digital security magazine in PDF format. The first issue has 46 pages and the included topics are:
* Does Firefox really provide more security than Internet Explorer?
* Security risks associated with portable storage devices
* 10 tips on protecting customer information from identity theft
* Linux security - is it ready for the average user?
* How to secure your wireless network
* Considerations for preventing information leakage
* An introduction to securing Linux with Apache, ProFTPd & Samba
* Security vulnerabilities in PHP Web applications
Monday, May 02, 2005
Juniper Targets Cisco With Security Strategy
MAY 02, 2005
Juniper, which is expected to make the announcement at the Interop show in Las Vegas, will also outline a broad network security framework that it plans to fill out over the next few years. The Enterprise Infranet initiative is designed to give users a comprehensive, policy-based approach to securing networks, applications and end-user devices, said Rod Murchison, the Sunnyvale, Calif.-based vendor's director of product management.
The framework planned by Juniper gives IT managers a potential alternative to Cisco's emerging Network Admission Control (NAC) technology and the Network Access Protection offering that Microsoft Corp. is developing.
Overall, the move to integrate security functions into the network layer is a good thing, said Hugh McArthur, director of information systems security at Online Resources Corp., a Chantilly, Va.-based online bill-processing firm.
But companies that have already invested in firewalls, intrusion-detection systems and network monitoring tools have little reason to dump their current technologies for the integrated functions, McArthur said. "I also feel that there are still advantages to using diverse products for providing multiple layers of protection that aren't vendor-dependent," he added.
The security functions being delivered at the network layer also need to mature more before many users will feel confident enough to enable the automated responses to network threats and attacks that the technologies support, said Eric Beasley, senior network manager at Baker Hill Corp. in Carmel, Ind.
"Right now, it wouldn't be something that I would let loose on my networks," he said.
David Flynn, vice president of products for Juniper's security tools and network-access routers, acknowledged that completely delivering on the Enterprise Infranet vision will be a multiyear process. In addition, many users will have to more tightly integrate their IT security operations in order to fully embrace Juniper's planned offerings, he said.
"It does change the way they need to think about how they operate," Flynn noted.
Juniper's new tools for controlling network access and usage are based on technology from its acquisition of NetScreen Technologies Inc. last year and are due for release in the third quarter. They're similar to the initial NAC products that Cisco released last year. But the tools also provide continuous monitoring of devices, instead of simply deciding whether they should be able to access a network, Flynn said.
Another key difference is that Cisco is integrating the security into its networking equipment, while Juniper is offering its tools as an "overlay solution" designed to work with a mix of network gear, said Robert Whiteley, an analyst at Forrester Research Inc.
Jim Slaby, an analyst at The Yankee Group in Boston, agreed. "Cisco's approach really anticipates that you have an all-Cisco network and that you have updated your network infrastructure to versions of the Cisco operating system that support NAC," he said. "For a lot of customers, that's going to take quite a while and be rather expensive."
Craig Stedman contributed to this story.
Lock Picking for Sport Cracks the Mainstream
Now, videogamers, hackers and others who just enjoy a good challenge, are coming out of the woodwork — or hiding in it — and adopting lock picking as their new hobby of choice.
Though some fear the hobby amounts to nothing more than burglary training, lock pickers claim they're not out to hurt anyone and may even help the public by exposing flaws in commonly used locks and other physical security devices.