
Sunday, April 01, 2007
KcPentrix 2.0: LiveDVD
Kcpentrix is based on SLAX 5, a Slackware live DVD.
Saturday, March 31, 2007
2006 Operating System Vulnerability Summary
"The summarized coverage of 2006 vulnerabilities by SANS showed the most prevalent attack vectors were not directly against the operating systems themselves.4 However, this article approaches the operating system as an entity in and of itself for analysis of only the vulnerabilities of core features. As such, vulnerability scans were conducted against 2006's flagship operating systems in various configurations to determine weakness from the moment of installation throughout the patching procedure. From Microsoft, testing included Windows XP, Server 2003 and Vista Ultimate. Examinations against Apple included Mac OS9, OSX Tiger and OSX Tiger server.5 Augmenting Apple's UNIX representation, security tests were also performed on FreeBSD 6.2 and Solaris 10. Rounding up the market share, Linux security testing included Fedora Core 6, Slackware 11, SuSE Enterprise 10 and Ubuntu 6.10. Before delving into the specifics of the vulnerabilities, it is helpful to understand the security scene of 2006."
Thursday, March 29, 2007
A Security Vendor Don't

RenderMan noticed this and happened to have a USB toolkit in his pocket. He was subsequently able to plug his USB key into the string of USB hubs unnoticed and retrieved it a bit later after it had collected password files and other assorted goodies.
The whole event was relayed to the entire audience at the closing ceremonies. It's a nice lesson on what not to do when exhibiting at events such as a "hacker" con...
Wednesday, March 28, 2007
Firefox Add-on - Tamper Data
Tuesday, March 27, 2007
Sunday, March 25, 2007
ShmooCon 07 - Day 3
While his talk didn't really focus on Online Banking that much, it was a good primer on non-evasive testing of web facing applications. Chuck fits the Mandiant profile - clean cut - smart guy... The tool that Chuck used in many of his examples is Paros. Hs slides should be posted on his site soon.
I also sat in on on Joel Bruno and Eric Smith's (PSKL) talk on - VOIP, Vonage, and Why I Hate Asterisk. They have done some neat work on RTP playback and in particular Vonage VOIP calls. You can find the SIPinator v1.0 code here. They also made a nice/funny commercial for ShmooCon.
The work the folks at the OLPC project are doing is way cool. Not going into details here, but ck them out.
Quick Summary -
Can't say enough about what a great value ShmooCon is and while not every session was exceptional, the event as a whole was. More highlights in the coming days as I parse thru notes etc...
Saturday, March 24, 2007
ShmooCon 07 - Day 2

The rest of the day was good - any Shmoo day is a good day...
One session was a bit different - Michael Schearer from The Church of WiFi presented: A Hacker in Iraq. A Naval Flight Officer - theprez98 talked about his experiences during his 9-month tour in Iraq embedded with Army units on the ground. He put his expertise in electronic warfare to good use against the biggest threat to coalition forces - the improvised explosive device (IED).
He also mentioned on how one of the best sources of real news from the war are the military blogs.
The Hacker Arcade was in full swing today along with Deviant and company's lock picking area. There are a couple of Nitro boxes running in the conf. NOC wonder who gave them that ideal.
Some of the security podcast folks were recording - I saw the CyberSpeak folks in action... look for Shmoo reports from Sploitcast and Hak.5.
More fun on Sunday...
Friday, March 23, 2007
ShmooCon 07 - Day 1
Eoin Miller and Adair Collins Auditing Cached Credentials with Cachedump and Johnny Long's No-Tech Hacking were probably my two favorites. Johnny's no-tech hacking talk was excellent in both content and presentation. A good deal of it focused on physical security and on demonstrating what an important hacking tool the power of observation can be.
Aviel Rubin ended things nicely with an exelent keynote. A copy of his presentation can be found here.
Dr. Rubin vs. Dr. Cole... my money is on Dr. Rubin
Thursday, March 22, 2007
Tool Time - Nessj

Get it here.
Wednesday, March 21, 2007
Top 10 U.S. Government Web Break-ins of All Time
Tuesday, March 20, 2007
Identity Theft is Getting more Businesslike

Via their semiannual Internet Security Threat Report - Symantec reported that much of the malicious computer code they identified was compiled, or translated into usable software, during standard, 9-to-5 work shifts in the country of origin.
"The hobby-horse hacker is a thing of the past. These guys work business hours,'' Huger said. "It's pretty organized, which is the scary part. Now we're seeing a well-oiled machine for stealing data.''
Among the other items reported was that China had 26 percent of the world's bot-infected computers, more than any country, a statistic mostly explained by the torrid growth of the Chinese technology industry. Also noted was that more than half of all underground economy servers known to Symantec were based in the United States.
However, a recent report from Symantec competitor McAfee tells us that Internet domains from Romania, Russia, and the tiny island of Tokelau are among the riskiest.What we do know is that phishing and spam is up... now apparently we just need a way to figure out where it is coming from. Unfortunately it is more often the destination that counts, not the journey and the US might be the way and/or the means, but it certainly isn't the end.
Sunday, March 18, 2007
Super Bowl Hack?

"To promote the new ZUG book, PRANK THE MONKEY, we wanted to show how easy it would be to broadcast a secret terrorist message not just on national TV, but on TV's biggest event. "
Saturday, March 17, 2007
Friday, March 16, 2007
Friday Fun - WiFi Vibrator

Hackers get bum rap for corporate America's digital delinquency
If Phil Howard's calculations prove true, by year's end the 2 billionth personal record -- some American's social-security or credit-card number, academic grades or medical history -- will become compromised, and it's corporate America, not rogue hackers, who are primarily to blame.
Howard and Erickson also found that:
- Malicious intrusions by hackers make up a minority (31 percent) of 550 confirmed incidents between 1980 and 2006; 60 percent were attributable to organizational mismanagement such as missing or stolen hardware; the balance of 9 percent was due to unspecified breaches.
- Likely as a result of California's law and similar legislation adopted by other states, the number of reported incidents more than tripled in 2005 and 2006 (424 cases) compared to the previous 24 years (126 cases).
- The education sector, primarily colleges and universities, amounted to less than 1 percent of all lost records, but accounted for 30 percent of all reported incidents.
Wednesday, March 14, 2007
File-sharing Software could Jeopardize National Security
"This report also reveals that these filesharing programs threaten more than just the copyrights that have made the United States the world’s leading creator and exporter of expression and innovation: They also pose a real and documented threat to the security of personal, corporate, and governmental data."
"But such condemnations just beg a more fundamental question: Why do children, grandparents, and poor single mothers end up sharing hundreds or thousands of infringing files inadvertently?"
Tuesday, March 13, 2007
The Silver Bullet Security Podcast

On the 12th episode of The Silver Bullet Security Podcast, Gary talks with Becky Bace, Advisor to Venture Capital firm Trident Capital. Becky spent twelve years at the NSA working on intrusion detection and cryptography from 1984 until 1996, followed by a stint at Los Alamos National Laboratory. Gary and Becky discuss growing up in rural America, explosives, and Becky’s Jimmy Hoffa sponsored college funding situation. They also talk about the evolution of security cirricula in academia, rampant commercialization of computer security, Becky’s involvement in tracking down the notorious Kevin Mitnick, vicodin-induced creativity, and eclectic music.
French Pick Ubuntu
When French MPs and their assistants return from their summer break this June, they will conduct parliamentary business on PCs running Ubuntu. From the next session of parliament, 1,154 desks will feature the Linux-based PCs.
More here.
Friday, March 09, 2007
The 50 Most Important People on the Web

Personal favorites:
31. Bruce Schneier - Cryptographer
32. Kevin Rose - Founder, Digg
47. Leo Laporte - Creator, This Week in Tech (TWiT) podcast
Who did they miss?
Thursday, March 08, 2007
Independent Comparatives of Anti-Virus software
Surprise! Microsoft's OneCare was on the bottom of the list...
BTW when the was the last time you had a virus on your system? Seems that a little common sense can go a long way in keeping a system clean, but don't tell the AV vendors that.
Network Information with Javascript
Sunday, March 04, 2007
Police use MySpace

As police continue searching for a suspect in four bank robberies across Arkansas, one local department has taken the unusual step of creating the man a profile on the social networking Web site MySpace, hoping someone will recognize him.
Story here.
Saturday, March 03, 2007
True? BBC Reported Building 7 Had Collapsed 20 Minutes Before It Fell

More here.
Friday, March 02, 2007
Friday Fun - School Security
As authorities stormed into a middle school office to arrest an alleged meth-dealing principal inside, they found an even more surprising scene inside.Story here.
Sources said 50-year-old John Acerra, of Allentown, was naked and watching gay pornography when they arrived at Nitschmann Middle School in Bethlehem to arrest him on Tuesday.
Acerra also had sex toys, drugs, cash and a pipe in his school office when authorities stormed his office, the sources added.
Wednesday, February 28, 2007
What a day...
- Air Force Officer Found Guilty of Raping 4 Men
- Miracle U.K. Baby Comes Back From the Dead
- Rats Chew Off Newborn Baby's Nose, Upper Lip in Kansas City, Mo., Apartment
- Human Head, Hand Found Along San Diego Freeway After Unidentified Body Found in River
- Wolfgang Puck Catering May Have Exposed Sports Illustrated's Swimsuit Issue Party Revelers to Hepatitis
Monday, February 26, 2007
Sunday, February 25, 2007
Hacking with Metasploit on a Nokia N800
"Its not as fast as a laptop but it's still pretty quick," Maynor said, explaining that he was able to break into a Windows 2000 SP4 server using a Metasploit exploit.
David's blog here.
Saturday, February 24, 2007
Lab Rats! Episode 61: Windows Security 101
Episode 61: Windows Security 101
Release date: February 19, 2007
In episode 61, Andy and Sean show you how to tighten security on Windows XP and Vista PCs.
Friday, February 23, 2007
Friday Fun - Foul-mouthed CDs get Blown in Church

Authorities determined the music players were not dangerous and kept the third one to check it for clues, said police Capt. Gary Johnson.
The CD players, duct-taped to the bottoms of the pews, were set to turn on in the middle of noon Mass on Wednesday at the Roman Catholic Cathedral Basilica of St. Francis of Assisi.
More here.
Wednesday, February 21, 2007
Home Security - When one sword in hand deserves another...

"It was a woman screaming," he recalled Tuesday. "She was screaming for help."
Sword in hand, he bounded up the stairs, kicked in the door and confronted a man who turned out to be alone - watching a pornographic movie.
"Now I feel stupid," Van Iveren said.
Worse yet, police seized his sword - a family heirloom - carted him to jail and referred the case to a prosecutor who charged Van Iveren with three criminal counts.
Full story here.Tuesday, February 20, 2007
Smokers may be the weak IT security link
The company hired NTA to test if it was possible to get inside the premises without proper identification, Hills said. The penetration tester waited until the smokers finished their break, then slipped in through the unlocked door, which wasn't the main one but publicly accessible.
The tester -- who skirted past other employees by saying the IT department had sent him -- made his way to a meeting room, where he hooked up his laptop to the company's VOIP (voice over Internet Protocol) network, Hills said. The tester could have launched a denial-of-service attack or intercepted phone calls.
The Silver Bullet Security Podcast #11
Get it here.
Sunday, February 18, 2007
Product Spotlight - USB Keylogger

2 Megabytes (16 Mbit) over 2,000,000 keystrokes
(around 1 years worth of intensive typing)
This keystroke recorder has up to 8 Megabytes memory capacity, organized into an advanced flash file system. Super fast data retrieve is achieved by switching into Flash Drive mode for download. Completely transparent for computer operation, no software or drivers required. Supports national keyboard layouts.
Buy it here.
Saturday, February 17, 2007
Missing FBI Laptops Still a Problem

Three or four FBI laptop computers are lost or stolen each month and the agency is unable to say in many instances whether information on the machines is sensitive or classified, the Justice Department's inspector general said Monday.
Of the 160 laptops lost or stolen over a 44-month period, 10 contained sensitive or classified information. The bureau did not have records on whether 51 others contained such data.
In a report five years ago, the inspector general said 354 weapons and 317 laptop computers were lost or stolen during a 28-month review.
Full Story form the AP here.
Home Security - Apperanntly TV can Kill You!

Mummified body found in Hampton Bays home
Southampton police responding to burst water pipes in a Hampton Bays home found the mummified body of the owner -- dead for more than a year -- sitting in a chair in front of a television, officials said Friday.Full Story.
The television was still on.
Vincenzo Ricardo, 70, appeared to have died of natural causes in his home on Wakeman Road, said Dr. Stuart Dawson, Suffolk deputy chief medical examiner.
The medical examiner's office considered his body mummified because the lack of humidity in his home preserved his features, morgue assistant Jeff Bacchus said.
Judge Limits New York Police Taping
In a rebuke of a surveillance practice greatly expanded by the New York Police Department after the Sept. 11 attacks, a federal judge ruled yesterday that the police must stop the routine videotaping of people at public gatherings unless there is an indication that unlawful activity may occur.NY Times story here.
Four years ago, at the request of the city, the same judge, Charles S. Haight Jr., gave the police greater authority to investigate political, social and religious groups.
In yesterday’s ruling, Judge Haight, of United States District Court in Manhattan, found that by videotaping people who were exercising their right to free speech and breaking no laws, the Police Department had ignored the milder limits he had imposed on it in 2003.
Friday, February 16, 2007
Friday Fun - Batman Sighting Puts Schools on Lockdown

More here.
Wow, lockdown.... Holy panic Batman!
Thursday, February 15, 2007
Fine for Stolen Laptop
The fine follows the theft of a laptop from a Nationwide employee's home which contained confidential customer data.
The Financial Services Authority (FSA) found security was not up to scratch after the man had put details of nearly 11 million customers on his computer.
The FSA also found that the Nationwide did not start an investigation until three weeks after the theft occurred.
Full story here.
Do you think fines on this side of the pond would help?
Wednesday, February 14, 2007
Substitute Teacher Faces Jail Time Over Spyware
A 40-year-old former substitute teacher from Connecticut is facing prison time following her conviction for endangering students by exposing them to pornographic material displayed on a classroom computer.Brian Krebs from the Washington Post, has an update on the case here.
Tuesday, February 13, 2007
Hiatus is over, posting returns....
TRENTON, Ohio -- Two Edgewood High School students were arrested Thursday and accused of hacking into the school district’s Web site to schedule an unplanned – and unauthorized – snow day.
School officials had originally planned a one-hour delay for Monday morning, following an established procedure, so they were surprised to see an announcement Sunday night that classes were canceled.
Full story here.
"I asked for a car, I got a computer. How's that for being born under a
bad sign?" - Ferris Bueller
Saturday, February 03, 2007
Hack5 Episode 2×07 LIVE February 3rd
The folks from hak5 will be broadcasting live today...
We’re excited to be announcing that episode 2×07 will be broadcasted LIVE over the Internets this February 3rd at 3:00 PM EST (-5 GMT). This schedule should work better for our European viewers.
We welcome you to sign up at hak5.org/live if you have a question for the cast and would like to be a guest on the show. There you can also find information on the stream and connecting.
Friday, February 02, 2007
Friday Fun - Humvee driving in Iraq
On the one hand, the story with this video says that American soldiers have to drive like this to limit the risk of attack. Some in the comments say its arrogant, and it’s no wonder Iraqis hate Americans. Others says if the driver slows down, gunfire would start, and thats not safe for anyone. What do you think?
Thursday, February 01, 2007
Monday, January 29, 2007
Securing a 'Buzz' - Just what the Doctor Ordered...
Dr. Robert Bohannon wants you in his world. It's fast, upbeat, jovial and driven by caffeine -- lots of it.
But four to six cups of coffee a day aren't enough for Bohannon. And he believes others share his need for more options when it comes time to pursue that caffeine buzz.
So the molecular scientist who moonlights as a café owner developed a way to add caffeine to baked goods, one that eliminates the natural, bitter taste of caffeine.
"This gives people the opportunity if they want to have a glass of milk and want to have caffeine. It will get them going," Bohannon said.
The amount of caffeine in his creations can vary, but Bohannon can easily put 100 milligrams of caffeine -- the equivalent of a 5-ounce cup of drip-brewed coffee -- into the treats he plans to market under the "Buzz Donuts" and "Buzzed Bagels" names.
Full story here.
X-ray cameras 'see through clothes'

The Government is considering installing X-ray cameras on lampposts to spot armed terrorists and other criminals.
According to a leaked memo seen by The Sun, "detection of weapons and explosives will become easier" if the scheme drawn up by Home Office officials is adopted.
However, officials acknowledged that it would be highly controversial as the cameras can "see" through clothing.
"The social acceptability of routine intrusive detection measures and the operational response required in the event of an alarm are likely to be limiting factors," the memo warned.
"Privacy is an issue because the machines see through clothing."
Full story here.Sunday, January 28, 2007
Kaspersky Lab releases an article about Vista and security
You can read the full version of the article, Vista vs. Viruses, on Viruslist.com.
Saturday, January 27, 2007
National Security
While you were sleeping (Bush took over the Government)
United States President stealthily took over the Federal Government last week through a new executive order last week that takes away all autonomy from Agencies, according to public interest organizations.
The order amends a series of previous executive orders that culminated in Executive Order No. 12,866, which the White House has used to give itself the power to review regulations before they can be officially published in the Federal Register.
Full story here:
Friday, January 26, 2007
Some "Brief" Friday Fun

The "Brief Safe" is an innovative diversion safe that can secure your cash, documents, and other small valuables from inquisitive eyes and thieving hands, both at home and when you're traveling. Items can be hidden right under their noses with these specially-designed briefs which contain a fly-accessed 4" x 10" secret compartment with Velcro closure and "special markings" on the lower rear portion. Leave the "Brief Safe" in plain view in your laundry basket or washing machine at home, or in your suitcase in a hotel room - even the most hardened burgler or most curious snoop will "skid" to a screeching halt as soon as they see them. (Wouldn't you?) Made in USA. One size. Color: white (and brown).
To add realistic smell, check out "Doo Drops".
Thursday, January 25, 2007
One Hacker Kit Accounts For 71% Of Dec Attacks
Exploit Prevention Labs launched a line of exploit detection tools -- LinkScanner Lite and LinkScanner Pro -- in November. The former is free, while the latter is priced at $19.99 for a one-year subscription.
More info here:
Tuesday, January 23, 2007
Low Tech Fix for High Tech Problem

Monday, January 22, 2007
The Silver Bullet Security Podcast



Sunday, January 21, 2007
Aircrack-ng 0.7 is Released
Aircrack-ng is the next generation of aircrack with lots of new features (planned and wanted).
Saturday, January 20, 2007
Risky Business - Greynets
A new FaceTime study reports -
2007's Biggest Risk: Employees Undermining Corporate Security
The danger of this new breed of malware is compounded by the increasingly risky behavior of today's employees, who frequently introduce consumer greynet applications onto the corporate network– most often without the sanction of their IT department. The user is squarely at the cornerstone of enterprise security concerns, according to FaceTime's Second Annual Greynets Survey (October, 2006). The survey revealed that:
- Four in ten end users (39%) believe they should be allowed to "install the applications they need on their work computers," independent of IT oversight or policy.
- Fifty-three percent of end users report they "tend to disregard" company policies that govern greynet usage, specifically IM and peer-to-peer file sharing.
- Eight in ten IT managers are at locations that have experienced greynet-related attacks within the last six months
- The number of greynet applications installed on a typical enterprise network have increased dramatically; work locations where eight or more greynet applications are in use have doubled, growing from 20 percent of all locations in 2005 to 41 percent in 2006.
- Sixty percent of managers report that within the past six months, security attacks have been more likely to have invisible effects (like keyloggers) rather than outcomes apparent to the end user, such as a hijacked browser, making compromised PCs more difficult to detect.
Friday, January 19, 2007
Swedish bank hit by 'biggest ever' online heist
One - this wasn't an online bank heist, this was just a plain old dumb user heist.
Nordea spokesman for Sweden, Boo Ehlin, said that most of the home users affected had not been running antivirus applications on their computers.Two - why should the bank be responsible for this? If I break into your house and steal your checkbook and/or a credit card, is the bank responsible? How is this different?Ehlin blamed successful social engineering for the heist, rather than any deficiencies in Nordea's security procedures.
"It is more of an information, rather than a security problem," said Ehlin. "Codes are a very important thing. Our customers have been cheated into giving out the keys to our security, which they gave in good faith."
The bank has borne the brunt of the attacks and has refunded all the affected customers.
Thursday, January 18, 2007
RF Jammer

This website details the design and construction Wave Bubble: a self-tuning, wide-bandwidth portable RF jammer. The device is lightweight and small for easy camoflauging: it is the size of a pack of cigarettes.
Lost HOPE?
HOTEL PENN THREATENED WITH DEMOLITION - HOPE CONFERENCES IN JEOPARDY
We received this disturbing news earlier in the month. Apparently the realty company that owns the Hotel Pennsylvania, site of our HOPE conferences, wants to tear down the historic hotel and replace it with a huge financial tower. Such a move could spell the end of HOPE.
The Hotel Pennsylvania was built in 1919 and has a very rich history. It has been home to many a "big band" concert in its early years and was the inspiration for the famous Glenn Miller song "PEnnsylvania 6-5000," a phone number that still rings at the Hotel Pennsylvania switchboard. The building itself, as any HOPE attendee knows, is filled with hidden corridors, rooms, and even floors. Being right across the street from Penn Station (New York's main train station), it's extremely easy to get to for those coming to New York for the first time. And because it's not an overly expensive place to stay, it's proven very popular for travelers from all over the world.
We've hosted five HOPE conferences at the Hotel Pennsylvania since 1994 and the next one is set for 2008. In preparation for this, and to discuss the fate of the hotel among other things, we are today launching a web-based forum for all things HOPE-related. You can reach this brand new forum at talk.hope.net.
Wednesday, January 17, 2007
Secure Relationship?
1 in 8 men would dump their girlfrend for an iPod
Yes, this is a fairly silly survey conducted on behalf of a company that wants you to use it to buy more gadgets. But still, the fact that one in eight men would apparently consider swapping their partner for the latest iPod, widescreen TV, home cinema system or fridge freezer is pretty shocking.
Tuesday, January 16, 2007
Verisign's ongoing Quarterly Vulnerability Challenge
Vulnerability Challenge Ground Rules:
- The vulnerability must be remotely exploitable and must allow arbitrary code execution in a default installation of one of the technologies listed above
- The vulnerability must exist in the latest version of the affected technology with all available patches/upgrades applied
- 'RC' (Release candidate), 'Beta', 'Technology Preview' and similar versions of the listed technologies are not included in this challenge
- The vulnerability must be original and not previously disclosed either publicly or to the vendor by another party
- The vulnerability cannot be caused by or require any additional third party software installed on the target system
- The vulnerability must not require additional social engineering beyond browsing a malicious site
Sunday, January 14, 2007
Security Now 74: Peter Gutmann On Vista Content Protection

Saturday, January 13, 2007
Personal Security - Dirty Hospitals

Of every 20 people who go into a U.S. hospital, one of them picks up something extra: an infection. It's a lousy card to draw. Infection stalls recovery, sometimes requiring weeks of intravenous antibiotics or a grueling round of surgeries to remove infected tissue. And for 90,000 Americans a year, the infections are a death sentence.
Full story here.
Friday, January 12, 2007
WTF or TGIF... It's Friday - Teacher found guilty of exposing kids to smut

The six-person jury Friday may have been wondering the same thing when they convicted Amero, 40, of Windham of four counts of risk of injury to a minor, or impairing the morals of a child. It took them less than two hours to decide the verdict. She faces a sentence of up to 40 years in prison.
Full story here.
Those poor kids! I imagine they will be scared for life and their morals impaired forever...
Thursday, January 11, 2007
Secure World? Not
The surge in troops will do nothing to change the underlying dynamics that continue to drive the violence in Iraq: deep-seated religious, ethnic, and tribal divisions and hatreds; and a high and rising level of antipathy among Iraqis across the sectarian divide towards the continuing occupation of their country by Western armies...
Wednesday, January 10, 2007
Bedtime reading...
Metaeye defines itself as metamorphic security that relates to definite change in the structural components of computer security with the passage of time and to incarnate itself by providing protective and innovative solutions.The Metaeye generically sets an element of metamorphism to this present security world.
Did the NSA Fix Vista?

When Microsoft introduces its long-awaited Windows Vista operating system this month, it will have an unlikely partner to thank for making its flagship product safe and secure for millions of computer users across the world: the National Security Agency.Full story here.
For the first time, the giant software maker is acknowledging the help of the secretive agency, better known for eavesdropping on foreign officials and, more recently, U.S. citizens as part of the Bush administration's effort to combat terrorism. The agency said it has helped in the development of the security of Microsoft's new operating system -- the brains of a computer -- to protect it from worms, Trojan horses and other insidious computer attackers.
That's Nice... Do Something That Looks Illegal, But Isn’t, Then Sue
A U.S. college student imprisoned for three weeks for trying to take flour-filled condoms onto an airplane has settled her lawsuit against Philadelphia for $180,000, a city spokesman said on Friday.
Janet Lee, 21, a student at Bryn Mawr College in Pennsylvania, was arrested at Philadelphia International Airport in 2003 after police and security officials thought the flour was an illegal drug.
She was held in Philadelphia on drug-trafficking charges and released only when tests proved the substance in the three condoms was flour.
The condoms, which are sometimes used to smuggle drugs, were a joke among the students, and Lee was taking them home to Los Angeles.
Her civil rights case against Philadelphia, which had been set to go to trial on Thursday, was settled for $180,000, said Ted Qualli, spokesman for Philadelphia Mayor John Street.
Tuesday, January 09, 2007
System/Software Inspection Tool
Feature Overview - The Secunia Software Inspector:
* Detects insecure versions of applications installed
* Verifies that all Microsoft patches are applied
* Assists you in updating your system and applications
* Runs through your browser. No installation or download is required.
Sunday, January 07, 2007
ShadowServer
Their recent Bot numbers here.
Early Warning Bark Worse Than Bite

An Israeli firm has designed a security system to ensure jailbreakers or intruders find a guard dog's bark can indeed be worse than its bite.Harnessing technology that interprets barking -- to see if an animal is responding to a threat instead of just routinely woofing -- the company aims to replace or supplement expensive electronic surveillance systems.
"There is currently very little utilisation of the watchdog's early warning capabilities," says privately owned manufacturer Bio-Sense Technologies, based in the Israeli town of Petah Tikva,on its Web site.
Friday, January 05, 2007
Life and Death? Medical Identity Theft
When Lind Weaver opened her mailbox one day in early 2004, she was surprised to find a bill from a local hospital for the amputation of her right foot. Surprised because the 57-year-old owner of a horse farm in Palm Coast, Fla., had never had worse than an ingrown toenail.
WikiLeaks
WikiLeaks is developing an uncensorable version of WikiPedia for untraceable mass document leaking and analysis. Our primary targets are highly oppressive regimes in China, Russia, central eurasia, the middle east and sub-saharan Africa, but we also expect to be of assistance to those in the west who wish to reveal unethical behavior in their own governments and corporations.
More Friday Fun with Tasers!
Friday Fun - Police hold camel over murdering a buffalo!

Abdul Waris Ali Shah, a resident of the area, had tied up his camel he had bought for Rs 38,000 for sacrifice. Sometime later, another resident of the same area Gulfam tied his sacrificial buffalo near the camel.
In the night, the camel fell upon the buffalo, bit the latter in the chest and gave it numerous blows with its front legs and killed it.
The other day when Gulfam, reached the spot to pick up his buffalo, he found it dead and rushed to the nearby police station to lodge an FIR against Abdul Waris.
And, interestingly, the police took the camel into custody, apparently for murdering the fellow mammal!!
Thursday, January 04, 2007
Domaintools.com
Check them out here.
Wednesday, January 03, 2007
Computer Hacker Steals $150,000 from Portage County Clerk of Courts Office
"With computers today you don't have to be anywhere close to the scene to commit some serious thefts..The ability to bank electronically is a major convenience to us but a huge security risk," said Stevens Point Police Chief Jeff Morris.
Chief advises that if you have an on line bank account check it daily. Also beware of people asking for your PIN, Social Security number or other information over the Internet.
Tuesday, January 02, 2007
Detecting temperature through clock skew
Even if that computer moves location and changes ISP, it can be later identified through this clock skew. In addition to varying between computers, clock skew also changes depending on temperature. Thus a remote attacker, monitoring timestamps, can make an estimate of a computers environment, which has wide-scale implications on security and privacy.
Monday, January 01, 2007
Secure Future - Toddler Found Playing Along Busy Highway

(12-31) 12:22 PST Indianapolis (AP) --
Drivers swerved cars and trucks into other lanes to avoid a 3-year-old boy, wearing only a diaper and T-shirt, who was playing along a busy highway after wandering away from home while his mother slept, police said.
Some motorists stopped along Interstate 465 on the city's west side Saturday to take care of the boy until officers arrived, the Indiana State Police said.
Police said they traced the toddler to an apartment at a nearby complex, where they found his mother, Nancy Dyer asleep in a filthy apartment and his 2-year-old sister eating spaghetti off the floor.
Child Protective Services took the boy and his sister into custody, and investigators said the agency also had been called to the apartment Thursday because the boy was outside unsupervised.
Sunday, December 31, 2006
Spy Numbers Stations on Shortwave Radio
"59372 98324 19043 78903 95320...". The mechanized female voice drones on and on... What have you stumbled on to? Instructions to spies? Messages exchanged between drug dealers? Deliberate attempts at deception and mis-information?
Chances are, all of the above! What you've tuned in to is called a "Spy Numbers Station". They've been on the air for several decades, and only recently have the mysteries started to unfold. But there's still much we don't know about these mysterious stations. With the information on these pages, you'll discover the little that we do know about these stations, what we're still trying to learn, and how you too can tune in to the spies.
Let's Hope for a Happy New Year...

In a span of a few hours, 2,973 people were killed in the Sept. 11, 2001, terrorist attacks. In a span of 45 months, the number of American troops killed in Iraq has exceeded that grim toll...
"An eye for an eye makes the whole world blind."
- Mahatma Gandhi
Friday, December 29, 2006
Daddy get you a new car for x-mas? Lockpicking - BMW decoder tool
You are going to put your Call Center where?
Analysis of defaced Indian websites year-2006 (till June) (ciwp-2006-02)
Wednesday, December 27, 2006
CISSP, CISA, and SSCP Open Study GROUP Online Quizzer
More info here.
Tuesday, December 26, 2006
On the Tuesday before Christmas...
On Tuesday, Chanell Martin gave her 12-year-old daughter an early Christmas present as a reward for helping out weekends at the family's Lincoln Mall store.
Her daughter, a sixth-grader, was delighted with the black Microsoft Zune media player Martin purchased earlier that day at the Evergreen Park Wal-Mart.
But not for long.
Martin went to her room while her daughter plugged the device, which can play music and video, into the family's computer.
"She said, 'Mom -- what's this?' " Martin said. "When she handed (the player) to me she was looking at a gay orgy."
On the Zune's hard drive, Martin discovered, was about 6-- hours of hardcore gay pornography and a "slideshow" of another 62 pornographic images.
Full story here.
Sunday, December 24, 2006
Secure Air Space - Track Santa

NORAD Santa tracker here.
Saturday, December 23, 2006
Tis The Season - Christmas.exe

There is a good article about it over on f-secure. Check it out here.
New Year - New Look
Happy Holidays!
Friday, December 22, 2006
Friday Fun - Tour XM

Tuesday, December 19, 2006
The Silver Bullet Security Podcast
XSS Intro/Demo
More info here.
Friday, December 15, 2006
Sunday, December 10, 2006
Question of the day
"Wonder if any of the Allbrittons (Joe, Robert, Barbie) will be going to Chile for the funeral of Augusto Pinochet???"
Getting Hacked Results In Armed Police Raid
Watch video.
Full story here.