Sunday, March 19, 2006
Geo IP Tool
Computer Networks: The Heralds of Resource Sharing
Saturday, March 18, 2006
Some Cool USB Toys

PC on a USB Stick Fights Child Pornography
The US 9th Circuit of Appeals recently made a ruling to allow police to search computer hard drives for child pornography if the PC owner is found to have subscribed to sites selling illegal images. To search a PC without knowing the password, the police can now turn to the Computer on a Stick Pro (COS).
The COS is a USB drive its own bootable operating system. To use it the police simply plug the COS into a vacant USB port on the suspect computer and allow the PC to reboot using the COS operating system, bypassing Windows passwords. Once booted the COS allows the files on the attached computer system to be viewed and copied to the USB COS hard drive.
Microsoft BlueHat Security Briefings Online
Friday, March 17, 2006
Shmoocon 2006 Follow-Up

Video: Finally starting to get some movies online... Check out the speaker list to see if the movie you're looking for is online yet. They will be posting about 5 movies a day. Hopefully in a week or so they'll all be online.
Thursday, March 16, 2006
A Good List of Live CD Distributions
Wednesday, March 15, 2006
Secure Voice over IP: Zfone
Tuesday, March 14, 2006
Tool Time - USB, FireWire and PCMCIA Scanner

Monday, March 13, 2006
The Bookmaker, the Wiz Kid and the Extortionist
Saturday, March 11, 2006
Ubuntu
Among the other public commitments the Ubuntu team makes, the team promises that the operating system will always be free, and there will be a new release every six months (each release is supported for 18 months).
More info and download here.
Prisoner 151716 of Cellblock 1A

He was arrested in October 2003, he said, because he loudly complained to the military, human rights organizations and the news media about soldiers' dumping garbage on a local soccer field. But some of his comments suggest that he is at least sympathetic toward insurgents who fight American soldiers.
"Resistance is an international right," he said.
Weeks after complaining about the garbage, he said, he was surrounded by Humvees, hooded, tied up and carted to a nearby base before being transferred to Abu Ghraib. Then the questioning began.
Read the full story here.
Friday, March 10, 2006
Computer Security Awareness Video Contest Winners
The EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance would like to announce the winners of a computer security awareness video contest, which was held as part of a national campaign to raise awareness of and increase computer security at colleges and universities. The contest searched for two categories of short computer awareness videos that addressed a broad range of security topics or focused on a single security issue. Submissions were developed by college students for college students. The winning videos are featured here and will be used in campus security awareness campaigns and efforts.
The contest included 62 video submissions from 17 universities. Winners were selected for creativity, content, and quality of information; overall effectiveness of delivery; and technical quality. Cash prizes were awarded to winners in each category. The two gold winners received $1,000, the two silver winners received $800, and the two bronze winners received $500 in cash prizes. For additional information, please see the press release.
See the winners here.
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text.info
Title says it all...
Happy Friday
ABA Journal - Stolen Lives
Wednesday, March 08, 2006
The Analog Hole
I try to avert my eyes when the person sitting next to me on the plane opens a laptop and displays a confidential memo. It may have been transmitted over a secure link (though it probably wasn’t), and it may be encrypted on disk (though it probably isn’t), but there it is in plain view, pouring out of the analog hole.
SecurityForest.com
Sunday, March 05, 2006
Live Action Recreation of the intro to The Simpsons
Saturday, March 04, 2006
Online Amateurs Crack Nazi Codes

More info here.
Friday, March 03, 2006
Fun with Stored Value Cards
Hydra - A very fast Network Logon Cracker
Number one of the biggest security holes are passwords, as every password security study shows.
Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.
Currently this tool supports:
TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA (incorporated in telnet module).
This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.
Friday Fun - Jon Stewart on Larry King
In case you missed Jon Stewart on Larry King the other night, Crooks & Liars has video and a partial transcript (but you really need to see or hear it, because a lot of the way Jon Stewart talks is lost in the literal written tranlsation.) Larry King made several feeble attempts to create controversy, and Jon Stewart kicked him square in the nuts each time. Witness this exchange:
KING: You don't want Medicare to fail?
STEWART: Are you insane?
KING: No.
STEWART: You're literally asking me if I would prefer -- yes, Larry, what I'm saying to you as a comedian I want old people to suffer, old and poor people to suffer. That is -- that is -- what we want is -- what seems absurd to me is the length that Washington just seems out of touch with the desires of Americans to be spoken to as though they are adults.
Nice try, Larry; too bad Jon didn't go for it. Maybe you can team up with Nancy Grace for a two hour Aruba Special to get back on familiar, more comfortable ground.
That question was just one of several "gotcha" attempts which failed spectacularly when Jon refused to take the bait, and instead turned the ludicrous question back on Larry King, who of course had no response other than this painful frozen half-smile that was equal parts fear and lothing. When Larry King wasn't completely controlling the tone and content of the show, you could feel how uncomfortable he was. Jon Stewart was so funny, and so quick-witted, and so smart and so insightful, if Larry King wasn't trying so hard to create controversy where there was none, you'd almost feel bad that he wasn't able to keep up.
Thanks to WWdNWednesday, March 01, 2006
Security Awareness Tips from DHS/US-Cert
Simpsons 'trump' First Amendment

Only one in four could name more than one of the five freedoms it upholds but more than half could name at least two members of the cartoon family.
About one in five thought the right to own a pet was one of the freedoms.
Monday, February 27, 2006
Cell Gunphone

At first sight it looks like a regular cell phone — same size, same shape, same overall appearance.
But beneath the digital face lies a .22-caliber pistol, a phone gun capable of firing four rounds in quick succession with a touch of the otherwise standard keypad.
The US Department of Homeland Security and the FBI are aware of the device and have instructed baggage screeners to be on the lookout for suspicious mobile phones. This is especially after 9/11.
European law enforcement officials — stunned by the discovery of these deadly decoys — say phone guns are changing the rules of engagement in Europe.
Airport authorities across Europe are implementing systems to X-ray all cell phones
“We find it very, very alarming,” says Wolfgang Dicke of the German Police union. “It means police will have to draw their weapons whenever a person being checked reaches for their mobile phone.”
The FBI, the Bureau of Alcohol, Tobacco and Firearms, and the U.S. Customs Service say they’ve been briefed on the new weapons.
“This criminal invention represents a potentially serious threat to law enforcement and the public,” said U.S. Customs Service Commissioner Raymond W. Kelly.
“We received word about these guns last month. We have since alerted our field personnel to be on the lookout for ‘cell phone guns’ at U.S. ports of entry.”
Full story and video here.
Rootkit Pharming
Sunday, February 26, 2006
E&Y Loses Four more Laptops
This theft follows a higher-profile incident earlier this month in which an Ernst and Young employee lost his laptop containing the social security numbers and other personal information of customers.
Ernst and Young appears set on establishing a laptop loss record in February...
Episode Six of the Sysadmin Sitcom The IT Crowd is now Downloadable

Saturday, February 25, 2006
DIY Hardware keylogger

DoD Staffer's Notes from 9/11 Obtained Under FOIA
"Hard to get good case. Need to move swiftly," the notes say. "Near term target needs - go massive - sweep it all up, things related and not."
The handwritten notes, with some parts blanked out, were declassified this month in response to a request by a law student and blogger, Thad Anderson, under the US Freedom of Information Act. Anderson has posted them on his blog at outragedmoderates.org.
Friday, February 24, 2006
New technique uses Photons, Physics to Foil Codebreakers
For governments and corporations in the business of transmitting sensitive data such as banking records or personal information over fibre optic cables, a new system demonstrated by University of Toronto researchers offers the protective equivalent of a fire-breathing dragon.
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. “The idea can be implemented now, because we actually did the experiment with a commercial device.”
The study describes the first experimental proof of a quantum decoy technique to encrypt data over fibre optic cable. In quantum cryptography, laser light particles (photons) carry complex encryption keys through fibre optic cables, dramatically increasing the security of transmitted data. Conventional encryption is based on the assumed complexity of mathematical problems that traditional computers can solve. But quantum cryptography is based on fundamental laws of physics — specifically, Heisenberg’s Uncertainty Principle, which tells us that merely observing a quantum object alters it.
Thursday, February 23, 2006
Taser Sets Florida Man On Fire
A man in Daytona Beach, Fla., was injured when a probe from a police Taser gun hit a butane lighter in his pocket and set him on fire, according to a Local 6 News report.
Police said Dennis Crouch, 54, apparently stabbed himself inside his home located in the 400 block of Grandview Avenue.
When officers arrived at the house, they found Crouch with a butcher knife threatening to kill himself.
Crouch apparently refused to comply with officers demands and was shot with a Taser gun.
A Taser probe hit a disposable butane lighter in his shirt pocket and ignited. Officers then rolled him to the ground to put out the flames.
Crouch was treated at Halifax Medical Center for burns and the stab wound.
The incident is under investigation to determine if additional safety requirements, Local 6 News reported.
[Full-disclosure] Gay Security Industry Experts Exposed!
Wednesday, February 22, 2006
Mini-Pentoo 2006.0 - Pentoo LiveCD Security Disk

It features the bare minimum tools for pentesting and support modules addition ala slax, allowing you to add some more stuff as you see fit.
You can also save your /etc, /root, ExploitTree and Nessus on a usb pen-drive, or anywhere else you want.
And last but not least, the Window Manager is the most sexiest available in the universe, providing you with genuine pen-testing pleasure.
DOWNLOAD
Download MPentoo LiveCD (HTTP).
Download MPentoo LiveCD (FTP).
Court Ruling Regarding Gramm-Leach-Bliley
In a legal decision that could have broad implications for financial institutions, a court has ruled recently that a student loan company was not negligent and did not have a duty under the Gramm-Leach-Bliley statute to encrypt a customer database on a laptop computer that fell into the wrong hands. Intrigued? Read on.
The judge dismissed the lawsuit. And then he noted...
Significantly, while recognizing that Gramm-Leach-Bliley does require financial institutions to protect against unauthorized access to customer records, Judge Kyle held that the statute "does not prohibit someone from working with sensitive data on a laptop computer in a home office," and does not require that "any nonpublic personal information stored on a laptop computer should be encrypted."
Tuesday, February 21, 2006
Secure Flying - Tuesdays Can Be For Fun Sometimes!

avoiding the obstacles...
Click on the pic to begin!
Monday, February 20, 2006
A True Story: "How we caught an Identity Thief"
It all started with a phone call. "Someone has the likeness of our site, on a very similar sounding domain!" This is the story of how igxglobal worked in conjunction with the client and the FBI to identify and stop a would be Identity thief.
Sunday, February 19, 2006
Personal Security - Severed Arm Still Clutching Mobile Phone
Jacqueline Dotson and her six-year-old daughter had to be cut out of their vehicle after the accident in which Dotson veered into the median and over-corrected, rolling her truck over the guardrail and landing upside down after flipping several times.
Several people stopped to help, and it turns out, the good samaritans may very well have saved Dotson's life. Sheila Vice, a nurse's aide, and an off-duty EMT from another county stopped to help, and put a tourniquet on Dotson's arm to stop the bleeding. Her arm was found near the accident still clutching a cell phone.
"Basically we stayed there and talked to them until the EMT drivers got there," said Vice.
Rescuers used the jaws of life to get the Dotson and her daughter out of the truck. Both were flown to hospitals, and Dotson is listed in serious condition at UK Hospital. Her daughter is not in the hospital, and sheriff's officials say they believe she's going to be fine.
Both were wearing seat belts.
Saturday, February 18, 2006
New episode of The IT Crowd, Very Cool SysAdmin Sitcom
Building a Forensics Computer

Friday, February 17, 2006
Friday Fun - Video Game Nostalgia

I have a Pong game like this. Ah the memories...
Thursday, February 16, 2006
Personal Security - US and Canadian Skiers get Smart Armour
The lightweight bendable material, known as d3o, can be worn under normal ski clothing. It will provide protection for US and Canadian skiers taking part in slalom and giant slalom races in Turin, Italy. Skiers normally have to wear bulky arm and leg guards to protect themselves from poles placed along the slalom run.
Tuesday, February 14, 2006
Baby Hack

Monday, February 13, 2006
Nmap 4.01 Released!
You can find 4.01 at the normal location:
http://www.insecure.org/nmap/download.html
Sunday, February 12, 2006
Saturday, February 11, 2006
Secure Travel - Head Found in Luggage

US immigration officials have arrested a Haitian woman after baggage screeners found a human head in her luggage at a Florida airport.
Myrlene Severe, 30, has been charged with failing to declare the head on a customs form and transporting "hazardous material".
A spokesman for Miami's immigration and customs agency told the AFP news agency that the head was not simply a skull.
"It had teeth, hair and skin, and quite a lot of dirt," she said.
Privacy Watchdog: Beware Google Desktop
The new feature, dubbed "Search Across Computers," caches users' text contents--including PDFs, spreadsheets, Word documents, e-mails, and other documents--on Google's servers, so that users can search them from any computer with an Internet connection. The EFF, however, claims that the feature puts users' data at risk. "EFF urges consumers not to use this feature, because it will make their personal data more vulnerable to subpoenas from the government and possibly private litigants, while providing a convenient one-stop-shop for hackers who've obtained a user's Google password," the foundation said in a statement.
Friday, February 10, 2006
Friday Fun - Burglar Checks email
Lori Menzel of the town of Kewaskum said the burglar left his Yahoo account open after checking his personal e-mail on the computer at her home.
``He never logged out,'' she said, adding: ``He made himself at home here. He spent some time in our bedroom trying on my husband's clothes. I could tell he went through some of my clothes.''
John the Ripper 1.7 Release is out
* Bitslice DES code for x86 with MMX: more than twice faster than older non-bitslice MMX code.
* Bitsliced the LM hash code as well: now several times faster.
* Significant improvements to the generic bitslice DES code: +20% on RISC.
* PowerPC G4+ AltiVec support (Mac OS X and Linux): effective 128-bitness for bitslice DES, resulting in huge speedups.
* First attempt at generic vectorization support for bitslice DES.
* Two MD5 hashes at a time for extra ILP on RISC: up to +80% on Alpha EV5+.
* Generic Blowfish x86 assembly code in addition to the original Pentium version: +15% on the Pentium Pro family (up to and including Pentium III), +20% on AMD K6 (Pentium 4 and newer AMD CPUs are more happy running the original Pentium code for Blowfish).
* Verbose logging of events to the global or a session-specific log file.
* Better idle priority emulation with POSIX.1b (POSIX.4) scheduling calls.
* System-wide installation support for *BSD ports and Linux distributions.
* AIX, DU/Tru64 C2, HP-UX tcb files support in unshadow.
* New make targets for Linux/x86-64, Linux/PowerPC, FreeBSD/Alpha, OpenBSD/x86-64, OpenBSD/Alpha, OpenBSD/SPARC, OpenBSD/SPARC64, OpenBSD/PowerPC, OpenBSD/PA-RISC, OpenBSD/VAX, NetBSD/VAX, Solaris/SPARC64, Mac OS X (PowerPC and x86), SCO, BeOS.
* Bug and portability fixes, and new bugs.
* Bonus: "Strip" cracker included in the default john.conf (john.ini).
Thursday, February 09, 2006
Police Beat
Ark. Police Chief, His Wife, Mayor Arrested
It's a lot for an Arkansas town of fewer than 4,300 residents to stomach in one day.
Florida Deputy Uses Car-cam to Tape Women

A sheriff's deputy in Martin County is accused of dishonoring his badge after he was caught videotaping scantily clad women while he was on patrol.
Wednesday, February 08, 2006
A Day in The Life of Chinese Internet Police
Pen Test Live CD 'Arudius' Reaches v0.5

This release features the addition of some novel security tools - tools for passive network discovery by analyzing broadcast traffic, very fast SMB password cracking tool and a UPnP device discovery tool analyzing M-SEARCH packets, to mention a few among others.
You can find it here.
Black Hat Fingers Email As Easy Target
Admins who allow email clients to receive unadulterated HTML documents are opening a hole in network security that can be very difficult to defend... especially once an attacker is inside the network perimeter.
HTML makes it easy to duplicate the appearance of groups from whom the end user regularly receives HTML messages, like banks, credit card companies and online auction houses. And hiding links to phishing or malware sites beneath apparently legitimate URLs is elementary.
When you add the potential havoc caused by attachments, ActiveX, Java, VBscript, and javascript... well, you get the picture. You open the door to all manner of rootkit, backdoor, keylogger, etc.
Sleeper Bugs used to Steal 1million in France
Police say the virus is embedded in emails or websites and remains dormant until the user contacts their bank online. When that happens, the bug becomes active and records passwords and bank codes which are then forwarded to the thieves. They then use the information to check the victim has money in the bank before transferring funds to the accounts of third parties, known as mules, who may have agreed to allow money to pass through their accounts in return for a commission of between 5% and 10%.
Police claim this is set up through fictitious companies, including one American firm named World Transfer, although the mules could be unaware that their computers are being used for theft.
Tuesday, February 07, 2006
BOA Allows ID Theft to Continue

“They asked if I worked on a horse ranch in eastern Washington, and I said no,” laughs Harrison. “[I’m] not quite the rancher type.”
She investigated and found out a laborer named Pablo has been using her Social Security number. And while Margaret pays for credit monitoring, she says the Equifax credit reporting bureau never noticed the problem until she told the agency. Now Equifax has put a fraud alert on her account. And then there’s this: Last month, the Bank of America sent her a new debit card bearing her name and Pablo’s picture!
Margaret says the Bank of America claims it can’t take any action against Pablo because he pays his bills on time — that her case is in what they call “a reactive state.”
“Because currently it’s not negatively impacting my credit, so I have no legal recourse for any action,” says Harrison.
Customer Service?
The Topology of Covert Conflict
Interesting research paper by Shishir Nagaraja and Ross Anderson. Implications for warfare, terrorism, and peer-to-peer file sharing:
Abstract:Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry body attempting to close down a peer-to-peer file-sharing network; medics attempting to halt the spread of an infectious disease by selective vaccination; and a police agency trying to decapitate a terrorist organisation. Albert, Jeong and Barabási famously analysed the static case, and showed that vertex-order attacks are effective against scale-free networks. We extend this work to the dynamic case by developing a framework based on evolutionary game theory to explore the interaction of attack and defence strategies. We show, first, that naive defences don’t work against vertex-order attack; second, that defences based on simple redundancy don’t work much better, but that defences based on cliques work well; third, that attacks based on centrality work better against clique defences than vertex-order attacks do; and fourth, that defences based on complex strategies such as delegation plus clique resist centrality attacks better than simple clique defences. Our models thus build a bridge between network analysis and evolutionary game theory, and provide a framework for analysing defence and attack in networks where topology matters. They suggest definitions of efficiency of attack and defence, and may even explain the evolution of insurgent organisations from networks of cells to a more virtual leadership that facilitates operations rather than directing them. Finally, we draw some conclusions and present possible directions for future research.
Sunday, February 05, 2006
BackTrack beta Released Today!

BackTrack is released in two flavours - Developer Edition and User Edition. These two CD's contain the same data, however have the following differences:Developer Edition
* Built from the individual modules which create BackTrack.
* Boot time is slow, due to large number of modules.
* Modulatiry is high, so user customisation is easier.
User Edition
* Individual modules consolidated.
* Boot time is faster, due to few modules.
* Modulatiry is low, so user customisation is harder.
You can download it here.
UK ID Fraud Figures 'inflated to play on public fears'
In a report published yesterday, the Home Office said that the annual cost of ID fraud had reached £1.7 billion. However, this figure was undermined by Apacs, the group that represents payment organisations such as banks and credit firms, which said that the cost had been grossly overestimated and that its own figures had been misrepresented.
Asked why the Home Office used the larger sum, she said: “I just think they think it is a good story to scare people with.”
Superbowl Sunday
Friday, February 03, 2006
GPS-Enabled Dart
With that street-cop psychology, Chief William J. Bratton unveiled Thursday a new and decidedly strange weapon in the LAPD's effort to halt high-speed pursuits.
It is an air-propelled miniature dart equipped with a global positioning device. Once fired from a patrol car, it sticks to a fleeing motorist's vehicle and emits a radio signal to police.
Bratton hailed the dart as "the big new idea" and said that if the pilot program was successful, Los Angeles' seemingly daily TV fix of police chases could be a thing of the past.
"Instead of us pushing them doing 70 or 80 miles an hour … this device allows us not to have to pursue after the car," Bratton said. "It allows us to start vectoring where the car is. Even if they bail out of the car, we'll have pretty much instantaneously information where they are."
Fridays are for Fun - Karate Experts Hired to Control Parrots

Around 40 members of a local karate club have been enlisted to protect around 140 classic cars due to visit an alpine village near Mt. Cook on New Zealand's South Island on Sunday, the New Zealand Press Association reported.
The karate experts will protect the cars from Keas, sharp-beaked native parrots which have been known to damage vehicles in their search for shiny items, NZPA said.
Thursday, February 02, 2006
Embarrassing Messages From Enron's Email
A couple of swaths thru Andrew Fiore's searchable archive of Enron's email database is enough to remind us all that, no matter where you go or what you do, your email is forever...
Wednesday, February 01, 2006
Microsoft Officially Releases Internet Explorer 7 Beta 2 and Out Pops the first Advisory
Internet Explorer 7 Beta 2 Preview will only run on Windows® XP Service Pack 2 (SP2) systems, but will ultimately be available for Windows Vista, Windows XP Professional x64 Edition, and Windows Server 2003.
The Windows XP edition of IE 7 Beta 2 Preview can be downloaded from here.
And so it begins...
Advisory: sp-x23-advisorySo I saw that Microsoft released IE 7.0 Beta 2 to the public today. So, I figured I would give it a quick look at and I just happened to find something within the first 15 minutes into testing. Weird huh? So your probally thinking, why release an advisory on a beta product? Well, why not? Its Microsoft right? You can check out the advisory here, and the PoC here.. And for the ones not running windows, here is a screenshot if your interested...
Tuesday, January 31, 2006
Computer Forensics, Network Security and Computer Crime Podcast

This week's episode -
In this episode we interview President of Red Cliff Consulting, Mr. Kevin Mandia, about trends in incident response. Also we talk about the windows registry, what not to do when interviewing for a tech job, brief talk with Nicholas Harbour about new version of DCFLDD, and NSA document redaction guidelines.
NMAP 4.0 Released!

British School Bans Raising Hands
A school in London has banned children from raising their hands in class and teachers from calling on students with their hands raised.
"It is every child's instinct and every teacher's instinct as well because it is ingrained in us," said Andrew Buck, the school's principal.
"Some pupils are jiggling so much to attract the teacher's attention that it sometimes looks as if they need the lavatory, then when it is their turn they often don't know the answer. Boys -- and it is usually boys -- are seeking attention, so they put their hands up before they have had time to think about the question."
Buck said the same children often wave their arms in the air, but when teachers try to involve less adventurous pupils by choosing them instead, it leads to feelings of victimization, the Daily Telegraph reported Saturday.
To spare embarrassment of the students who do not know the answer, the school has incorporated a "phone a friend" system, allowing one child to nominate another to take the question instead.
Sunday, January 29, 2006
TorPark: Anonymous Browsing on a USB Drive
Friday, January 27, 2006
Friday Fun - Old space-suit = Experimental Satellite

Details here.
Black Hat Federal 2006 - Presentations
Thursday, January 26, 2006
[IN]SECURE Magazine - Issue 5 (January 2006) Released
The covered topics are:
- Web application firewalls primer
- Review: Trustware BufferZone 1.6
- Threat analysis using log data
- Looking back at computer security in 2005
- Writing an enterprise handheld security policy
- Digital Rights Management
- Revenge of the Web mob
- Hardening Windows Server 2003 platforms made easy
- Filtering spam server-side
Wednesday, January 25, 2006
Software Security: Building Security In
ISBN: 0321356705; Published: Jan 23,
2006; Copyright 2006; Dimensions 7x9-1/4
; Pages: 448; Edition: 1st.
Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of
- Risk management frameworks and processes
- Code review using static analysis tools
- Architectural risk analysis
- Penetration testing
- Security testing
- Abuse case development
In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs.
Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
Users to Blame for Net Banking Woes
The blame for online banking insecurity is as much down to user ignorance as banking inadequacy, the UK Financial Services Authority (FSA) has argued.
In its Financial Risk Outlook 2006, published today, the authority identified several groups of banking customers that it says present the greatest security problems.
These included a hardcore five percent of users who take no security precautions whatsoever when using banking websites, and a further 21 percent who think it unlikely that criminals could access their accounts without the user knowingly having supplied the login. Overall, the FSA found that the young tend to be less security conscious.
A surprisingly high 45 percent of customers surveyed believe that banks should take sole responsibility for online security. If the banks attempted to move all liability for online banking losses to customers, 77 percent say they would abandon Internet banking completely.
Botmaster
James seems to be offline nowadays... However, the court papers make a fun read.
Tuesday, January 24, 2006
Laptop Mini Wireless Antenna
Saturday, January 21, 2006
Thief Makes Off With $2,000 Toilet Seat
San Diego police are searching for a valuable, high-tech toilet seat taken from an unlocked storage closet.
Hamid Shoushtari bought the toilet seat on the Internet. He said the missing seat -- worth an estimated $2,000 -- is heated. He had planned to see whether he could market the seat in California when it was stolen.
"We may not use it in California, but in colder places like Chicago or New York, in the morning you can program it and it will heat up your toilet seat for about 15 minutes or whatever time you want," Shoushtari said. "You sit on it, you can adjust the water temperature if you want to make it warmer or colder."
Shoushtari said he did have concerns about how the toilet seat would work because it combined electricity and water, a potentially deadly situation for someone sitting on it.
The case is the first grand theft of a toilet seat in San Diego.
Friday, January 20, 2006
Microsoft Earns Patching Praise from IT Execs
Microsoft Corp. may take the most heat on security vulnerabilities, but other software vendors need to catch up when it comes to dealing with flaws found in their products, according to users and analysts interviewed last week.
“Their biggest problem now is trying to get past all of the negative legacy perceptions,” said Hugh McArthur, director of information systems security at Chantilly, Va.-based Online Resources Corp., which offers online banking and bill payment services to the financial industry. McArthur added that he would give Microsoft “an A for effort and a B+ for execution” on security issues.
Thursday, January 19, 2006
Annual FBI Computer Crime Survey
One item that did catch my attention was that according to the survey "Just 9% of the participants said they reported incidents to law enforcement, believing the infractions were not illegal or that there was little law enforcement could or would do. Of those reporting, however, 91% were satisfied with law enforcement's response. And 81% said they'd report future incidents to the FBI or other law enforcement agencies."
I think the issue here is the general lack of understanding of what a threat is, how to judge what should be reported and/or why even bother at all...
Today the PC virus celebrates its 20th Anniversary

Boot sector viruses, now long extinct along with the floppy disk, held a relatively long reign from 1986 to 1995. Since transmission was via disk from computer to computer, infection would only reach a significant level months or even years after its release. This changed in 1995 with the development of macro viruses, which exploited vulnerabilities in the early Windows operating systems. For four years, macro viruses reigned over the IT world and propagation times shrank to around a month from the moment when the virus was found to when it was a global problem.
Blacklisted411 - Online Edition 4 - 01.16.2006
Wednesday, January 18, 2006
hacker. (towards an understanding of a word and a concept)
Parrot Spilled the Beans and got the Boot

Ziggy's obsession with his latest impression grew and he began uttering "Hi Gary!" every time Suzy Collins' mobile phone rang. Chris's suspicions deepened after Ziggy started to make long kissing noises whenever he heard the name Gary on television or the radio.
Things between Chris and Suzy finally came to a head the night Ziggy decided to blurt out: "I love you, Gary" in her voice.
When Chris confronted Suzy about his pet's obsession, she admitted to having had a four-month affair with Gary, a former colleague.
Unable to bear the verbal taunts of his faithful bird, the 30-year-old computer programmer gave Ziggy to a local parrot dealer and asked him to find him a new home.
Tuesday, January 17, 2006
Russian Ultranationalist Party Says Hackers Could Help Fight Terror
Russia’s ultranationalist Liberal Democratic Party has called for enlisting services of computer hackers to fight extremism and terrorism.
A statement released by the party and obtained by the Interfax news agency on Tuesday read that hackers “should be widely involved in thwarting pro-terrorist and pro-extremist websites and encouraged to take part in such activities.”
Whatever the public attitude towards those individuals, “the Internet is the domain where hackers are omnipotent,” the statement reads. Therefore, their services should be enlisted to fight terrorism. “A hacker attack is a strong weapon that may be used not only for breaking into bank accounts or performing other illegal actions, but also for the benefit of the nation and the state,” the LDPR activists are convinced.
LDPR is led by Vladimir Zhirinovsky, deputy chairman of the State Duma, the lower house of Russian parliament. Zhirinovsky rose to prominence as a flamboyant politician, notorious for his extravagant ideas and eccentric behavior.
Covers come off UK Spy Plane

Images of the UK's first prototype stealth surveillance aircraft have been unveiled.
The unmanned vehicle, which has been built by BAE Systems, is known as the Corax, or as the Raven.
The Corax bears some resemblance to a cancelled US military spy plane called DarkStar, analysts have said.
Jane's International Defence Review said the unmanned aircraft "indicated a new direction in combat vehicles for the UK's armed forces".
Monday, January 16, 2006
Insecurities of Online Banking
More info on the topic an also be found at:
Why eBanking is Bad for your Bank Balance
Risk Management Principles for Electronic Banking
Google + Public Knowledge + Sex Offenders
Sunday, January 15, 2006
OpenRCE
Saturday, January 14, 2006
ShmooCon 06

Compared to what you get for your money at say a SANS and/or a CSI event, ShmooCon is the clear winner.
The Post's Brian Krebs was quick to cover Simple Nomad's chat on "Hacking the Friendly Skies".
Fyodor did a great presentation on Nmap, a copy of his slides and a special ShmooCon dist can be found here.
I also liked kaos.theory and their Anonym.OS LiveCD. Anonym.OS is an OpenBSD 3.8 Live CD with strong tools for anonymizing and encrypting connections. Standard network applications are provided and configured to take advantage of the tor onion routing network. You can download it here.
Charlie Brown's Philosophy About Security

Charlie Brown: Security is sleeping on the back seat of the car when you're a little kid, and you've been somewhere with your mom and dad, and it's night, and you're riding home in the car, asleep. You don't have to worry about anything. Your mom and dad are in the front seat and they do all the worrying. They take care of everything.
Peppermint Patty: That's real neat.
Charlie Brown: But it doesn't last. Suddenly you're grown up, and it can never be that way again!
Peppermint Patty: Never?
Charlie Brown Absolutely never.
Peppermint Patty (horrified): Hold my hand, Chuck!
Friday, January 13, 2006
Forged Credentials and Security - Crooks Flashing Fake Badges

When Frank Coco pulled over a 24-year-old carpenter for driving erratically on Interstate 55, Coco was furious. Coco was driving his white Chevy Caprice with flashing lights and had to race in front of the young man and slam on his brakes to force him to stop.
Coco flashed his badge and shouted at the driver, Joe Lilja: "I'm a cop and when I tell you to pull over, you pull over, you motherf-----!"
Coco punched Lilja in the face and tried to drag him out of his car.
But Lilja wasn't resisting arrest. He wasn't even sure what he'd done wrong.
"I thought, 'Oh my God, I can't believe he's hitting me,' " Lilja recalled.
It was only after Lilja sped off to escape -- leading Coco on a tire-squealing, 90-mph chase through the southwest suburbs -- that Lilja learned the truth.
Coco wasn't a cop at all.
He was a criminal.
Fridays Are For Fun! - Surveillance Video
''Oh, I'll give you the money,'' the store clerk said in mocking tones as he grabbed a wooden baseball bat and swung it at the would-be robber. Singh then charged from behind the counter, hitting the man six times in the head and shoulders before he ran off.Wish some of the folks on the softball team could hit like this... Video from surveillance camera of an attempted robbery of the Bethlehem (Pa.) Exxon on Tuesday, Jan. 10.
Thursday, January 12, 2006
Department of Homeland Security Promotes Vendor Video
The video is interesting and probably worth a viewing, but what bugs me about this is that DHS is basically giving a free add/plug for a particular vendor...
Wednesday, January 11, 2006
Burned CDs Last 5 years Max -- Use Tape?
Although opinions vary on how to preserve data on digital storage media, such as optical CDs and DVDs, Kurt Gerecke, a physicist and storage expert at IBM Deutschland GmbH, takes this view: If you want to avoid having to burn new CDs every few years, use magnetic tapes to store all your pictures, videos and songs for a lifetime.
NIST has found that recordable disks seem to last much longer than rewritable disks, Byers said, and even longer than manufactured disks such as CDs for installing commercial software.
General industry guidelines now estimate office-burned copies of CDs and DVDs could remain readable for 100 to 200 years.
Tuesday, January 10, 2006
Home Security - Flaming Mouse Burns Down House

An 81-year-old Fort Sumner homeowner said he caught a mouse inside his house and just wanted to get rid of it.
The man threw the critter in a pile of burning leaves near his home, but it ran back to the house on fire.
Village Fire Chief Juan Chavez said the mouse ran to just beneath a window and the flames spread up the window and throughout the house.
All contents of the home were destroyed, but no injuries were reported, Chavez said.
Unseasonably dry and windy conditions have charred more than 53,000 acres and destroyed 10 homes in southeastern New Mexico in recent weeks.
Monday, January 09, 2006
US-CERT: 5,198 Software Flaws in 2005
Data Mining 101: Finding Subversives with Amazon Wishlists
At this point, Tom had a list of Amazon usernames and had identified any "suspicious" books and authors that appeared on each user's wishlist.
But there was still more to do. Amazon allows a user to include their city and state information on their wishlist, so Tom had the information to take it to the next level: plotting his suspects on a Google map.
Starbucks Little Secret

Saturday, January 07, 2006
Personal Security - USMC: Armor Shortfalls
