-----Original Message-----
From: Miss Freya [mailto:artzgale@gmail.com]
Sent: Wednesday, December 08, 2010 12:02 AM
To:
Subject: Dear Internet User
DEAR RECEIVER,
You have just received a Taliban virus. Since we are not so technologicaly advanced in Afghanistan, this is a MANUAL virus. Please delete all the files on your hard disk yourself and send this mail to everyone you know.
Thank you very much for helping us.
Thanks & Regard's
Miss Freya
Wednesday, December 08, 2010
Sunday, December 05, 2010
TWiT Live Specials 52: Tron: Legacy
TWiT Live Specials 52: Tron: Legacy
Host: Sarah Lane
Behind the scenes of TRON: Legacy with the filmmakers and cast.
Host: Sarah Lane
Behind the scenes of TRON: Legacy with the filmmakers and cast.
Thursday, November 25, 2010
Wednesday, November 10, 2010
Saturday, October 16, 2010
Saturday, September 25, 2010
Practical Lock Picking: A Physical Penetration Tester's Training Guide [Paperback]
Great book for the beginner or an old pro. Been reading lock picking books for 35 years and this is one of the best... Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief "spy manuals" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease.
Friday, August 13, 2010
Sunday, August 01, 2010
Tuesday, July 27, 2010
Sunday, July 18, 2010
Cuban Spy Gets Life Without Parole, Wife Gets 6 ½ Years
The 73-year-old great grandson of Alexander Graham Bell was sentenced Friday to life in prison without parole for quietly spying for Cuba for nearly a third of a century from inside the State Department. His wife was sentenced to 5½ years.
Retired intelligence analyst Kendall Myers said he meant his country no harm and stole secrets only to help Cuba's people who "have good reason to feel threatened" by U.S. intentions of ousting the communist Castro government.
But U.S. District Judge Reggie Walton said Myers and his 72-year-old wife, Gwendolyn, had betrayed America and should receive heavy punishment.
Full background story here.
Retired intelligence analyst Kendall Myers said he meant his country no harm and stole secrets only to help Cuba's people who "have good reason to feel threatened" by U.S. intentions of ousting the communist Castro government.
But U.S. District Judge Reggie Walton said Myers and his 72-year-old wife, Gwendolyn, had betrayed America and should receive heavy punishment.
Full background story here.
Labels:
Spy
Friday, July 16, 2010
Wednesday, July 14, 2010
Friday, July 09, 2010
Saturday, June 26, 2010
Friday, June 11, 2010
Wednesday, May 12, 2010
Sunday, May 02, 2010
Mine is due to arrive tomorrow, more soon...
本: běn. The Chinese character 本 signifies an origin or the beginning place; It signifies exactly what the first version of the NanoNote is: a beginning.
The 本 version of NanoNote is an ultra small form factor computing device. The device sports a 336 MHz processor, 2GB of flash memory, microSD slot, head phone jack, USB device and 850mAh Li-ion battery. It boots Linux out of the box and also boots over USB. It’s targeted squarely at developers who see the promise of open hardware and want to roll their own end user experience. It’s the perfect companion for open content; we envision developers turning the device into a music or video player for Ogg or an offline Wikipedia or MIT OpenCourseWare appliance. Or you can simply amaze your friends by creating an ultra small handheld notebook computer. You choose the distribution. The 本 Nanonote is the first in a line of products that will see the addition of other hardware capabilities. Get your NanoNote and start a Nanoproject today. Or join one of the existing projects in our developer community.
本: běn. The Chinese character 本 signifies an origin or the beginning place; It signifies exactly what the first version of the NanoNote is: a beginning.
The 本 version of NanoNote is an ultra small form factor computing device. The device sports a 336 MHz processor, 2GB of flash memory, microSD slot, head phone jack, USB device and 850mAh Li-ion battery. It boots Linux out of the box and also boots over USB. It’s targeted squarely at developers who see the promise of open hardware and want to roll their own end user experience. It’s the perfect companion for open content; we envision developers turning the device into a music or video player for Ogg or an offline Wikipedia or MIT OpenCourseWare appliance. Or you can simply amaze your friends by creating an ultra small handheld notebook computer. You choose the distribution. The 本 Nanonote is the first in a line of products that will see the addition of other hardware capabilities. Get your NanoNote and start a Nanoproject today. Or join one of the existing projects in our developer community.
Friday, March 26, 2010
Monday, March 15, 2010
Salmonella outbreak tracked by shopper cards
What do you think - good thing or bad? Can certainly see the good use, but what if used for the wrong reasons? A witch hunt of sorts...
Health authorities in the U.S. have for the first time used department store credit cards to help trace the source of a recent salmonella outbreak that left hundreds of Americans ill.
Investigators at the Centers for Disease Control and Prevention were scrambling to find the source of the outbreak when they hit upon the idea of tracking grocery purchases of those who became ill.
With permission from the patients, health authorities followed the trail of grocery purchases to a Rhode Island company that makes salami, then zeroed in on the pepper used to season the meat.
Read more: http://www.cbc.ca/health/story/2010/03/12/consumer-salmonella.html#ixzz0iFhw2XUI
Health authorities in the U.S. have for the first time used department store credit cards to help trace the source of a recent salmonella outbreak that left hundreds of Americans ill.
Investigators at the Centers for Disease Control and Prevention were scrambling to find the source of the outbreak when they hit upon the idea of tracking grocery purchases of those who became ill.
With permission from the patients, health authorities followed the trail of grocery purchases to a Rhode Island company that makes salami, then zeroed in on the pepper used to season the meat.
Read more: http://www.cbc.ca/health/story/2010/03/12/consumer-salmonella.html#ixzz0iFhw2XUI
Saturday, March 13, 2010
Friday, March 12, 2010
Thursday, March 11, 2010
Rainbow Tables hosted on an SSD
New work on a rainbow table system that will crack a 14 char XP password in
under 6 seconds.
Read about it here.
Try it out: demo
under 6 seconds.
Read about it here.
Try it out: demo
SANS/CWE Top 25 Dangerous Programming Errors list
SANS/CWE released a top 25 dangerous programming errors list. It contains their list of the most common errors that developers are likely to make. The intention is to raise awareness to these problems and help prioritize the order of importance for organizations new into the security game. Their blog has been covering each of the Top 25 problems and provides some commentary on each of them. They are up to #13
Read all about it here.
Read all about it here.
Wednesday, March 10, 2010
Friday, March 05, 2010
Wednesday, March 03, 2010
Report: The Command Structure of the Aurora Botnet: History, Patterns, and Findings
Did the "experts" get it wrong? Were the attacks on Google by amateurs?
"Many security vendors have explained the operation against Google, dubbed “Operation Aurora,” using a military vernacular. However, based upon analysis of exhaustive data surrounding these attacks and examination of both the malware and the CnC topologies used by the criminals behind Aurora, it appears that this threat can best be classified as a just another common botnet attack – and one that is more amateur than average."
Read the report from Damballa here.
"Many security vendors have explained the operation against Google, dubbed “Operation Aurora,” using a military vernacular. However, based upon analysis of exhaustive data surrounding these attacks and examination of both the malware and the CnC topologies used by the criminals behind Aurora, it appears that this threat can best be classified as a just another common botnet attack – and one that is more amateur than average."
Read the report from Damballa here.
Monday, March 01, 2010
Defrauding and Hacking Ticketmaster
This really a hack?
"To defeat the Online Ticket Vendors' technologies, the defendants worked with computer programmers in Bulgaria to establish a nationwide network of computers that impersonated individual visitors to the Online Ticket Vendors' websites, the indictment alleges. The network – described as the "CAPTCHA Bots" in the indictment – gave Wiseguys the ability to flood the Online Ticket Vendors' computers at the exact moment that event tickets went on sale."
Full story here.
"To defeat the Online Ticket Vendors' technologies, the defendants worked with computer programmers in Bulgaria to establish a nationwide network of computers that impersonated individual visitors to the Online Ticket Vendors' websites, the indictment alleges. The network – described as the "CAPTCHA Bots" in the indictment – gave Wiseguys the ability to flood the Online Ticket Vendors' computers at the exact moment that event tickets went on sale."
Full story here.
Friday, February 26, 2010
UBS Access Key (IBM Zone Trusted Information Channel)
What do you think... good idea? Biz banking saver?
Wednesday, February 24, 2010
Friday, February 19, 2010
Wednesday, February 17, 2010
Martial Law for Cyberspace?
Danger Will Robinson - the iPhone will be the end of civilization!
The federal government isn't prepared to cope with a widespread cyber attack, former top Bush and Clinton administration officials said Tuesday.
The officials participated in a public cybersecurity war game, where they simulated how the government would respond to a widespread cyber attack. The scenario started with malware spread through an iPhone app; the attack eventually crippled cell phone networks and Internet service, and it ended with much of the East Coast without power due to a failing electrical grid.
Full story here.
The federal government isn't prepared to cope with a widespread cyber attack, former top Bush and Clinton administration officials said Tuesday.
The officials participated in a public cybersecurity war game, where they simulated how the government would respond to a widespread cyber attack. The scenario started with malware spread through an iPhone app; the attack eventually crippled cell phone networks and Internet service, and it ended with much of the East Coast without power due to a failing electrical grid.
Full story here.
Simon the IT Dummy
This whole series rocks. Simon the IT Dummy, the poster boy for under appreciated IT (Security) people everywhere.
Tuesday, February 16, 2010
Sunday, February 14, 2010
Cloud security news and whimsy sans the bullshit.
Similar format to Liquidmatrix.org a new site dedicated to cloud security.
Tuesday, February 09, 2010
Wednesday, January 27, 2010
How to catch an iPhone thief
Thanks to Brian Krebs for finding... this is a way cool story.
Monday - The Setup
The rest of the story here.
Monday - The Setup
The whole thing started when my plane landed in Los Angeles on Monday afternoon at 2:55pm coming from Cabo San Lucas. The guy sitting next to me on the plane asked me to loan him a pen so that he could fill out his customs form. I watched him fill out the form and clearly remember his birth year of 1984, but am a bit unsure about his name. I think it was -----, but in this story, we will refer to him as Pinche.
The rest of the story here.
Wednesday, January 20, 2010
Sunday, January 17, 2010
Friday, January 15, 2010
Note to terrorist
You really want to terrorize the US? Just put a dud bomb in your butt, get on a plane and tell people about it. Next up... cavity searches for everyone!
Labels:
Friday Fun
Thursday, January 14, 2010
Robertson: Haiti had pact with devil
WTF! Why not blame it on the Easter Bunny or Santa. Relating what he called a "true story," Rev. Pat Robertson asserted on his TV show, "The 700 Club" that Haiti was struck by a devastating earthquake because its founding fathers made a pact with the devil.
Wednesday, January 13, 2010
Monday, January 11, 2010
Thursday, January 07, 2010
Fun site for toys
Some of the product descriptions are a fun read...
http://www.chinawholesale365.com/
http://www.chinawholesale365.com/
Labels:
Friday Fun