Tuesday, June 05, 2007
Sunday, June 03, 2007
Credit Union Don'ts
Each member's account number and SSN.
Text from Letter of apology:
Important Security Message to Members
During the last week, we mailed our election ballots to members. Unfortunately, an error occurred during the distribution of this ballot, and personal information was inadvertently included above your address on the envelope. This information was not printed in a format that would be immediately recognizable, and we have no indication your personal information has been accessed or misused in any way.
We apologize for this distribution error, and deeply regret any inconvenience or concern it may cause you. Your privacy and security are our top priority, and we have taken precautionary measures to help ensure your protection.
New protocols are in place to thoroughly validate your identity before any account transaction can be made. New member authentication procedures will further ensure you are the only person who can open new accounts, apply for a loan or do business with our credit union.
We will provide, at no cost to you, a one-year membership in a credit monitoring service. Equifax will monitor your credit daily and immediately alert you if there is any unusual activity. You will soon receive a separate letter about Equifax explaining exactly how you can enroll and how the program works. If you have any questions, please call us at 626/441-1999 or 323/682-1999.
Additional operational and security enhancements will ensure this situation cannot happen again. We are committed to protecting your personal information, and will closely monitor your account for the next year. We are also happy to change your member number, upon your request.
We will take whatever steps are necessary to protect you and your confidential information, and your accounts remain safe and sound with your credit union. Please don’t hesitate to call us at 626/441-1999 or 323/682-1999 or visit your local branch if you have any questions or concerns about this issue.
In addition to the steps we are taking to protect you and your accounts, here are other security precautions you can take:
* Carefully review your accounts when you receive your statement for at least the next 12 – 24 months. You can also review your accounts online at www.priorityonecu.org. This is a good financial management practice, and an important part of keeping your financial information accurate and secure.
* Place a Security Alert on your credit bureau file. Security alerts provide added protection because they recommend creditors contact you before opening new accounts. To place a Security Alert or to obtain a copy of your credit report, please contact:
o Experian: 1-888-397-3742 www.experian.com,
o Equifax: 1-800-525-6285 www.equifax.com
o Transunion: 1-800-680-7289 www.transunion.com
* Contact the following resources for additional information and guidance relating to privacy and identity theft:
o Federal Trade Commission (FTC): 1-877-IDTHEFT www.consumer.govidtheft
o Social Security Administration’s Fraud Hotline: 1-800-269-0271
* Call us right away if you have any questions or concerns, or suspect any unusual activity, at 626/441-1999 or 323/682-1999.
We appreciate your continued support of Priority One Credit Union, and want you to know that “you are our first priority.”
Charles R. Wiggington, Sr. CEO/President
Friday, June 01, 2007
Michigan Man Fined for Using Coffee Shop's Wi-Fi Network
A Michigan man has been fined $400 and given 40 hours of community service for accessing an open wireless Internet connection outside a coffee shop.Full story.
Under a little known state law against computer hackers, Sam Peterson II, of Cedar Springs, Mich., faced a felony charge after cops found him on March 27 sitting in front of the Re-Union Street Café in Sparta, Mich., surfing the Web from his brand-new laptop."It wasn't anything we were looking for, and it wasn't anything that we frankly particularly wanted to get involved in, but it basically fell in our lap and it was a little hard to just look the other way when somebody handed it to us," said Lynn Hopkins, assistant prosecuting attorney for Kent County.
Under the statute, individuals who log on to a Wi-Fi network with the owner's permission, or who see a pop-up screen that says it's a public network, can assume they're authorized to use the network, Hopkins said.
If they don't, they could be subject to prosecution.
Peterson was given two choices: He could try to fight the felony charge and face a sentence of up to 5 years in jail or a $10,000 fine; or he could enroll in the diversion program, which would require paying a $400 fine, doing 40 hours of community service and staying on probation for six months.
Last week, Peterson chose to pay the fine instead as part of a jail-diversion program.

Per Yoggie the Pico has:
Complete protection against
- Viruses
- Worms
- Identity theft
- Data theft
- Phishing
- Spyware
- Spam
- IP Spoofing
- Denial of Service attacks
All-in-one Security
- Anti Virus
- Anti Spam
- Anti Phishing
- Intrusion Detection
- Intrusion Prevention
- Firewall (Stateful Inspection)
- Web Filtering
- Parental Content Control
- Adaptive Security Policy™
- Multi-Layer Security Agent™
- Layer-8 Security Engine
Tuesday, May 29, 2007
Monday, May 28, 2007
Sunday, May 27, 2007
Why Are CC Numbers Still So Easy To Find?
Tool TIme - Drobo

This thing seems way cool to me, watch a demo here.
Drobo is a four drive array that connects via USB and employs "intelligent" software to handle all of the data management and disk swapping: one drive goes down? No problem, Drobo's already on it. Wanna swap out drives while you listen to music? Drobo keeps the tunes going even when you're down to one disk.
Friday, May 25, 2007
"Between Silk and Cyanide: A Codemaker's War"

Between Silk and Cyanide: A Codemaker's War, 1941-1945
Hardcover: 624 pages
Publisher: Free Press (June 9, 1999)
Language: English
ISBN-10: 0684864223
ISBN-13: 978-0684864228
Friday Fun - A Fair(y) Use Tale
- Had to of been a lot of work...
Thursday, May 24, 2007
The 14th episode of The Silver Bullet Security Podcast
Wednesday, May 23, 2007
Hack My Son's Computer, Please
Can an elderly father give police permission to search a password-protected computer kept in his adult son's bedroom, without probable cause or a warrant? In April, a three judge panel of the 10th Circuit Court of Appeals said yes.
This week, the son's attorney, Melissa Harrison, an assistant federal public defender in Kansas City, will ask the court to reconsider the panel's ruling. At stake is whether law enforcement will have any responsibility to respect passwords and other expressions of user privacy when searching devices which contain the most sensitive kinds of private information.
Tuesday, May 22, 2007
Sending Encrypted Emails With S/MIME Protocol
Sunday, May 20, 2007
Friday, May 18, 2007
Friday Fun - Tandy Computer Whiz Kids Comics

Thursday, May 17, 2007
New Site for Data Loss Statistics - etiolated
Surveilance Basics
3. Murphy's Law
4. Surveillance Room: Policies and Procedures
5. The Observer's Instinct, or "JDLR"
10. False Reports
11. Confidentiality
12. Teamwork Part I
13. Assisting Casino Management
15. Shift Checklist
16. Teamwork Part II: The Surveillance Room Team
17. Job Descriptions
by Gary Powell and Jim Goding
Wednesday, May 16, 2007
eBay Scammer on Judge Judy
Somthing to Think About
- John Vorhaus
Tuesday, May 15, 2007
Sunday, May 13, 2007
Reminder: Monday is Wiretap the Internet Day
May 14th is the official deadline for cable modem companies, DSL providers, broadband over powerline, satellite internet companies and some universities to finish wiring up their networks with FBI-friendly surveillance gear, to comply with the FCC's expanded interpretation of the Communications Assistance for Law Enforcement Act.
Congress passed CALEA in 1994 to help FBI eavesdroppers deal with digital telecom technology. The law required phone companies to make their networks easier to wiretap. The results: on mobile phone networks, where CALEA tech has 100% penetration, it's credited with boosting the number of court-approved wiretaps a carrier can handle simultaneously, and greatly shortening the time it takes to get a wiretap going. Cops can now start listening in less than a day.
Saturday, May 12, 2007
Sex Toy Threatens Cyprus's National Security
Story source.
Friday, May 11, 2007
Friday "Fun"
A man cut off his own head with a chainsaw after stabbing his 70-year-old father to death in their apartment in the German city of Cologne, police said.
The body of the offender, 24, was found headless when police raced to the apartment after an emergency call, apparently from the dying father, had been broken off in mid-sentence.
Body found in bed after seven years
The decomposed corpse of a German man has been found alone in his bed after nearly seven years, police in the western city of Essen said today.
The police said in a statement the man was 59 and unemployed at the time of his death. He most likely died of natural causes on November 30, 2000, the date he received a letter from the Welfare Office found in the flat, police said.
Thursday, May 10, 2007
The Attacks Against Estonian Servers
Russia's aggressive displays towards Estonia of late, in the wake of the moving of the "Bronze Soldier" Soviet war memorial, have not been confined to rioting by nationalists on the streets of Tallinn or the blockading of the Estonian Embassy in Moscow.
Estonian government websites and others have been the victims of denial-of-service attacks since Friday of last week [April 27th, the day the statue was moved, following a night of rioting that left one man dead].
Wednesday, May 09, 2007
Fed Worker Sues over Googling
When: U.S. Court of Appeals for the Federal Circuit rules on May 4.
Outcome: Unanimous three-judge panel says no harm was done by using search engine.
More
Tuesday, May 08, 2007
Anti-Violence Electrode Shock Gun

Multi-Functions
1.With Cartridge of probes
Fire two probes up to a distance of 3.5M , which transmits pulsed energy that temporarily overrides the central nervous system of the target causing immediate incapacitation
2.With Cartridge of pepper powder
Pepper powder spray out up to a distance of 3 ~ 5M , and swells the veins in the which will cause a few people swells the mucous membranes to make breathing difficult,eyes, causing the tears dropped and the eyes to close
3. With Cartridge of rubber bullet
Used especially by military personnel and law enforcement officers in crowd control.10 ~ 15M effective distance
4. With Cartridge of paint bullet
Used especially by military personnel and law enforcement officers in crowd control.10 ~ 15M effective distance.
5.With Extended electric stick
For extending defense range to around 50cm
6.Capable of drive stun with or without cartridge of probes installed
7.Deployed Power ful Xenon light
Blind Man's Bluff
Don't try to dupe Kent Parker just because he's blind and operates a deli in the Hamilton County Courthouse.More here.
Every once in a while, somebody tries to cheat him despite the security cameras trained on the cash register and about a dozen sheriff's deputies a few steps away.
In the past two weeks, two women offered bills smaller than they claimed and were arrested within minutes.
Sunday, May 06, 2007
TJX was it Wardriving?

There, investigators now believe, hackers pointed a telescope-shaped antenna toward the store and used a laptop computer to decode data streaming through the air between hand-held price-checking devices, cash registers and the store's computers. That helped them hack into the central database of Marshalls' parent, TJX Cos. in Framingham, Mass., to repeatedly purloin information about customers.
More here.
Friday, May 04, 2007
Thursday, May 03, 2007
Tools to Really Erase a HD
Here is info on how really erase hard drive data:
Tutorial on Disk Drive Data Sanitization
Gordon Hughes - CMRR Secure Erase Page
Another alternative is an open source external block overwrite utility called Darik's Boot and Nuke ("DBAN").
Wednesday, May 02, 2007
Gartner: Hacking contests bad for business
The research manager of TippingPoint, the company that paid $10,000 for the QuickTime vulnerability and its associated exploit, rebutted by saying that at no time was there any danger of the vulnerability escaping from responsible parties.
"Public vulnerability research and 'hacking contests' are risky endeavors and can run contrary to responsible disclosure practices, whereby vendors are given an opportunity to develop patches or remediation before any public announcements," said analysts Rich Mogull and Greg Young in a research note published by Gartner on Monday.
Full InfoWorld story.
Certainly starts to blur the lines between the good guys, the bad and "responsible disclosure". How long before company A puts a bounty on "security research" of company B - their competitor?
Monday, April 30, 2007
Secure Future - Coffee Drinking Health Benefits

More here.
Saturday, April 28, 2007
The Very Secure F-22

Total damage to the airplane, according to sources inside the Pentagon: $1.28 million. Not only did the firefighters ruin the canopy, which cost $286,000, they also scuffed the coating on the airplane's skin which will cost about $1 million to replace.
More here.Friday, April 27, 2007
Friday Fun w/John T Draper (AKA Captain Crunch)

Read his stories here.
Wednesday, April 25, 2007
Uncle Sam Issues "Final" Report on Identity Theft
Top 10 Internet Crimes of 2006

Virginia’s IC3 2006 Internet Crime Report.
Tuesday, April 24, 2007
Chicago Man Exonerated; Becomes 200th Exoneree Nationwide

In 200th DNA Exoneration Nationwide, Jerry Miller in Chicago Is Proven Innocent 25 Years After Wrongful Conviction
Innocence Project launches “200 Exonerated, Too Many Wrongfully Convicted,” month-long national campaign to address and prevent wrongful convictions
(CHICAGO, IL; April 23, 2007) – With new DNA tests proving that Jerry Miller did not commit a brutal rape in Chicago for which he was convicted in 1982, the Innocence Project said today that Miller is the 200th person in the nation exonerated through DNA evidence.
In 1981, Miller was arrested and charged with kidnapping, raping and robbing a woman in downtown Chicago. He was convicted in 1982 and served 24 years in prison. Eleven months ago, he was released on parole as a registered sex offender, requiring him to wear an electronic monitoring device at all times and prohibiting him from answering his door on Halloween or leaving his job for lunch. Miller, who served more than three years in the military, was 22 years old when he was arrested and is now 48. DNA testing on semen from the rape proves that Miller did not commit the crime – and instead implicates another man as the actual perpetrator.
Silvert Bullet Podcast - Episode 13
Sunday, April 22, 2007
Mail BITS
Saturday, April 21, 2007
Finding Webcams w/Google
or
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
The Hole - video powered by Metacafe
Friday, April 20, 2007
Friday Fun - Lady Taser

The TASER C2 can stop a threat up to 15 feet (4.5 meters) away, allowing you to protect yourself and your family from a safe distance. You can also use the C2 as a contact stun device to repel someone - a powerful backup capability.
TASER® technology has proven itself as the safe self-defense choice with over 500,000 uses worldwide. TASER technology is supported by dozens of independent medical reports attesting to its general safety.
Get yours here.
Wednesday, April 18, 2007
FAA Advisory - Boeing 787 Hacking
On-board wired and wireless devices may also have access to parts of
the airplane's digital systems that provide flight critical functions.
These new connectivity capabilities may result in security
vulnerabilities to the airplane's critical systems. For these design
features, the applicable airworthiness regulations do not contain
adequate or appropriate safety standards for protection and security of
airplane systems and data networks against unauthorized access.
Tuesday, April 17, 2007
Last year was a hot one for UFO sightings
Chris Rutkowski says the 2006 Canadian UFO Survey recorded the third largest number of sightings in its 17-year history and shows there’s still a great deal of interest in unexplained phenomena in the sky.
Monday, April 16, 2007
cDc Launches - Cowfeed

"Based in Lubbock, Texas, CULT OF THE DEAD COW (cDc) is the most-accomplished and longest-running group in the computer underground. Founded in 1984 and widely considered to be the most elite people to ever walk the face of the earth, this think tank has been referred to as both "a bunch of sickos" (Geraldo Rivera) and "the sexiest group of computer hackers there ever was" (Jane Pratt, _Sassy_ and _Jane_ magazines). The cDc is a leading developer of Internet privacy and security tools, which are all free to the public. In addition, the cDc created the first electronic publication, which is still going strong."
Virginia Tech rampage
In my mind the only issues that should be covered at this juncture are that there has been a terrible and senseless loss of human life and that the only one at fault/to blame here - is the one who pulled the trigger...
Note: on average there are 2.4 US military fatalities every day in IRAQ - 3,308 total so far. Most the same age or younger as the VT students.
Sunday, April 15, 2007
Rock Phish
Red Tape Chronicles
Secure Future? Are mobile phones wiping out our bees?

If it is phones, then why now?
It seems like the plot of a particularly far-fetched horror film. But some scientists suggest that our love of the mobile phone could cause massive food shortages, as the world's harvests fail.
They are putting forward the theory that radiation given off by mobile phones and other hi-tech gadgets is a possible answer to one of the more bizarre mysteries ever to happen in the natural world - the abrupt disappearance of the bees that pollinate crops. Late last week, some bee-keepers claimed that the phenomenon - which started in the US, then spread to continental Europe - was beginning to hit Britain as well.
Full story here.
Saturday, April 14, 2007
Geek Accused of Videotaping Woman in Her Shower
Their mom called Best Buy's Geek Squad for help with their computer. Now two sisters are suing Best Buy, claiming the technician who showed up secretly taped one of them in the shower.Full story here.
Friday, April 13, 2007
Happy Friday - One From the Vault
Credit Union - Laptop Theft
"The computer was protected by two layers of security, a unique user-identifier and a multiple-character, alpha-numeric password."Whew, that's a relief! Press release here.
The laptop was lost by a consultant from Protiviti:
"Protiviti is a leading provider of independent internal audit and business and technology risk consulting services."Now I know where not to bank and who not to pick as my auditor...
Thursday, April 12, 2007
Wednesday, April 11, 2007
From Russia with Love

I just love Russia...
An interview with a former cyber gangster, who claims to have now joined the “white hats” and was prepared to share his experience anonymously. His first name is Victor, but his last name will be kept secret. He is 30 years old and a resident of St. Petersburg, Russia.
Tuesday, April 10, 2007
A Phishing Attack Demo Against the BOA SiteKey Authentication

From the slight paranoia blog:
Executive Summary
We present this demonstration of a "deceit-augmented man in the middle attack" against the SiteKey ® service used by Bank of America (the underlying technology is also used by other companies). This, or a similar attack, could be used by a phisher to deceive users into entering their login details to a fraudulent website. BoA's own website tells users: "[W]hen you see your SiteKey, you can be certain you're at the valid Online Banking website at Bank of America, and not a fraudulent look-alike site. Only enter your Passcode when you see the SiteKey image and image title you selected."
See the demo here.
In the News
Microsoft Defends Effort to Patch Flaw
IT execs, researchers split over pace of work on ANI fix
Hugh McArthur, director of information systems security at Online Resources Corp. in Chantilly, Va., said that in general, Microsoft’s 100-day turnaround time for patching the so-called ANI vulnerability doesn’t seem all that unusual.
It wasn’t as if the software vendor was “just sitting back and doing nothing,” McArthur said. “My take is that Microsoft was hoping they could get the fix written and tested prior to an exploit being written. In this case, they didn’t make it.”
Despite all the hoopla, the vulnerability “ultimately wasn’t a big issue” for Online Resources, McArthur said. But he added that the online bill-processing company treated the threat “very seriously” and made sure that its antivirus software was up to date and that its monitoring tools were configured to detect any exploit attempts on its systems.
Hak.5 - Episode 2×09 Release (ShmooCon)
Monday, April 09, 2007
Debian GNU/Linux 4.0 released
The Debian Project is pleased to announce the official release of Debian GNU/Linux version 4.0, codenamed
etch, after 21 months of constant development. Debian GNU/Linux is a free operating system which supports a total of eleven processor architectures and includes the KDE, GNOME and Xfce desktop environments. It also features cryptographic software and compatibility with the FHS v2.3 and software developed for version 3.1 of the LSB.
Using a now fully integrated installation process, Debian GNU/Linux 4.0 comes with out-of-the-box support for encrypted partitions. This release introduces a newly developed graphical frontend to the installation system supporting scripts using composed characters and complex languages; the installation system for Debian GNU/Linux has now been translated to 58 languages.
How to get it here.
Sunday, April 08, 2007
Saturday, April 07, 2007
Friday, April 06, 2007
So prOn is Dangerous After all

Police launched a probe last week after a navy officer married to a Chinese woman was found to have taken home a computer disk containing information about the high-tech Aegis radar system, domestic media said.
Aegis is used on Japanese destroyers that are to be fitted with SM-3 missile interceptors from this year as part of the missile defence program. The officer told police he accidentally copied the confidential data onto his computer's hard disk when copying porn from a computer belonging to a crew member from another destroyer, the Yomiuri newspaper reported.
Story here.Wednesday, April 04, 2007
Below the Hole
The no-tolerance policy fits Augusta National's image. The club fancies itself as the most tradition-bound of golf bodies, one that prohibits anything high-tech from disturbing the peace on its grounds. The scoreboards for the Masters are all manually operated. The only prominent clock at Augusta National is a sundial dedicated to Bobby Jones. Blimps are forbidden in the skies overhead. Even electric vacuum cleaners are taboo in the clubhouse.
All of this makes for great theater, as golfers, visitors, and TV viewers are transported back to a world free of Jumbotrons and Gnarls Barkley ringtones. But while the Masters brass has carefully cultivated a technology-hating image, all this Luddism is a façade. Beneath the club's manicured greenery lies an arsenal of technological wonders that keeps the course looking timeless and pristine. Indeed, take a deep enough divot at Augusta National and you'll unearth the most technologically advanced setup in golf.
The greens, for one, are state-of-the-art. Beneath each putting surface is a latticework of pipes, pressurized valves, electric motors, and radio controls.
I asked exactly what he was up to, all he would say was, "data collection." The club's PR department wouldn't elaborate.
Full story here.
From root kit to boot kit: Vista's code signing compromised
At the Black Hat Conference in Amsterdam, security experts from India demonstrated a special boot loader that gets around Vista's code signing mechanisms. Indian security experts Nitin and Vipin Kumar of NV labs have developed a program called the VBootkit that launches from a CD and boots Vista, making "on the fly" changes in memory and in files being read. In a demonstration, the "boot kit" managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista RC2 (build 5744), even without a Microsoft signature.
Experts say that the fundamental problem that this highlights is that every stage in Vista's booting process works on blind faith that everything prior to it ran cleanly. The boot kit is therefore able to copy itself into the memory image even before Vista has booted and capture interrupt 13, which operating systems use for read access to sectors of hard drives, among other things.
More here.
Softer flashlights for LA cops
The new flashlight, developed specifically for the Los Angeles Police Department and expected to be acquired by police forces around the world, replaces the heavy 13-inch (33-cm) metal flashlights controversially used by city officers to strike a car theft suspect three years ago.
More here.
The 7060 LED will be available to the general public in June. More information on Pelican's 7060 is available at www.pelican7060.com.
Tuesday, April 03, 2007
Survey Shows Public Feels Safer in City Spaces Lit by LEDs

"When “LED City” Raleigh and Cree Inc. turned on new light-emitting diodes (LEDs) in the Avery C. Upchurch Government Complex’s parking garage, people’s opinions about the quality of the lighting improved threefold."More here.
NRO: 40 Years of Reconnaissance
Forty Years of Reconnaissance. This is actually a music video about the NRO. Sample lyrics:
"And we'll be there when you call
Even Friday night's all right
We'll see and hear it all
Taking it on with all our might."
[5min, 37sec]
Sunday, April 01, 2007
KcPentrix 2.0: LiveDVD
Kcpentrix is based on SLAX 5, a Slackware live DVD.
Saturday, March 31, 2007
2006 Operating System Vulnerability Summary
"The summarized coverage of 2006 vulnerabilities by SANS showed the most prevalent attack vectors were not directly against the operating systems themselves.4 However, this article approaches the operating system as an entity in and of itself for analysis of only the vulnerabilities of core features. As such, vulnerability scans were conducted against 2006's flagship operating systems in various configurations to determine weakness from the moment of installation throughout the patching procedure. From Microsoft, testing included Windows XP, Server 2003 and Vista Ultimate. Examinations against Apple included Mac OS9, OSX Tiger and OSX Tiger server.5 Augmenting Apple's UNIX representation, security tests were also performed on FreeBSD 6.2 and Solaris 10. Rounding up the market share, Linux security testing included Fedora Core 6, Slackware 11, SuSE Enterprise 10 and Ubuntu 6.10. Before delving into the specifics of the vulnerabilities, it is helpful to understand the security scene of 2006."
Thursday, March 29, 2007
A Security Vendor Don't

RenderMan noticed this and happened to have a USB toolkit in his pocket. He was subsequently able to plug his USB key into the string of USB hubs unnoticed and retrieved it a bit later after it had collected password files and other assorted goodies.
The whole event was relayed to the entire audience at the closing ceremonies. It's a nice lesson on what not to do when exhibiting at events such as a "hacker" con...
Wednesday, March 28, 2007
Firefox Add-on - Tamper Data
Tuesday, March 27, 2007
Sunday, March 25, 2007
ShmooCon 07 - Day 3
While his talk didn't really focus on Online Banking that much, it was a good primer on non-evasive testing of web facing applications. Chuck fits the Mandiant profile - clean cut - smart guy... The tool that Chuck used in many of his examples is Paros. Hs slides should be posted on his site soon.
I also sat in on on Joel Bruno and Eric Smith's (PSKL) talk on - VOIP, Vonage, and Why I Hate Asterisk. They have done some neat work on RTP playback and in particular Vonage VOIP calls. You can find the SIPinator v1.0 code here. They also made a nice/funny commercial for ShmooCon.
The work the folks at the OLPC project are doing is way cool. Not going into details here, but ck them out.
Quick Summary -
Can't say enough about what a great value ShmooCon is and while not every session was exceptional, the event as a whole was. More highlights in the coming days as I parse thru notes etc...
Saturday, March 24, 2007
ShmooCon 07 - Day 2

The rest of the day was good - any Shmoo day is a good day...
One session was a bit different - Michael Schearer from The Church of WiFi presented: A Hacker in Iraq. A Naval Flight Officer - theprez98 talked about his experiences during his 9-month tour in Iraq embedded with Army units on the ground. He put his expertise in electronic warfare to good use against the biggest threat to coalition forces - the improvised explosive device (IED).
He also mentioned on how one of the best sources of real news from the war are the military blogs.
The Hacker Arcade was in full swing today along with Deviant and company's lock picking area. There are a couple of Nitro boxes running in the conf. NOC wonder who gave them that ideal.
Some of the security podcast folks were recording - I saw the CyberSpeak folks in action... look for Shmoo reports from Sploitcast and Hak.5.
More fun on Sunday...
Friday, March 23, 2007
ShmooCon 07 - Day 1
Eoin Miller and Adair Collins Auditing Cached Credentials with Cachedump and Johnny Long's No-Tech Hacking were probably my two favorites. Johnny's no-tech hacking talk was excellent in both content and presentation. A good deal of it focused on physical security and on demonstrating what an important hacking tool the power of observation can be.
Aviel Rubin ended things nicely with an exelent keynote. A copy of his presentation can be found here.
Dr. Rubin vs. Dr. Cole... my money is on Dr. Rubin
Thursday, March 22, 2007
Tool Time - Nessj

Get it here.
Wednesday, March 21, 2007
Top 10 U.S. Government Web Break-ins of All Time
Tuesday, March 20, 2007
Identity Theft is Getting more Businesslike

Via their semiannual Internet Security Threat Report - Symantec reported that much of the malicious computer code they identified was compiled, or translated into usable software, during standard, 9-to-5 work shifts in the country of origin.
"The hobby-horse hacker is a thing of the past. These guys work business hours,'' Huger said. "It's pretty organized, which is the scary part. Now we're seeing a well-oiled machine for stealing data.''
Among the other items reported was that China had 26 percent of the world's bot-infected computers, more than any country, a statistic mostly explained by the torrid growth of the Chinese technology industry. Also noted was that more than half of all underground economy servers known to Symantec were based in the United States.
However, a recent report from Symantec competitor McAfee tells us that Internet domains from Romania, Russia, and the tiny island of Tokelau are among the riskiest.What we do know is that phishing and spam is up... now apparently we just need a way to figure out where it is coming from. Unfortunately it is more often the destination that counts, not the journey and the US might be the way and/or the means, but it certainly isn't the end.
Sunday, March 18, 2007
Super Bowl Hack?

"To promote the new ZUG book, PRANK THE MONKEY, we wanted to show how easy it would be to broadcast a secret terrorist message not just on national TV, but on TV's biggest event. "
Saturday, March 17, 2007
Friday, March 16, 2007
Friday Fun - WiFi Vibrator

Hackers get bum rap for corporate America's digital delinquency
If Phil Howard's calculations prove true, by year's end the 2 billionth personal record -- some American's social-security or credit-card number, academic grades or medical history -- will become compromised, and it's corporate America, not rogue hackers, who are primarily to blame.
Howard and Erickson also found that:
- Malicious intrusions by hackers make up a minority (31 percent) of 550 confirmed incidents between 1980 and 2006; 60 percent were attributable to organizational mismanagement such as missing or stolen hardware; the balance of 9 percent was due to unspecified breaches.
- Likely as a result of California's law and similar legislation adopted by other states, the number of reported incidents more than tripled in 2005 and 2006 (424 cases) compared to the previous 24 years (126 cases).
- The education sector, primarily colleges and universities, amounted to less than 1 percent of all lost records, but accounted for 30 percent of all reported incidents.
Wednesday, March 14, 2007
File-sharing Software could Jeopardize National Security
"This report also reveals that these filesharing programs threaten more than just the copyrights that have made the United States the world’s leading creator and exporter of expression and innovation: They also pose a real and documented threat to the security of personal, corporate, and governmental data."
"But such condemnations just beg a more fundamental question: Why do children, grandparents, and poor single mothers end up sharing hundreds or thousands of infringing files inadvertently?"
Tuesday, March 13, 2007
The Silver Bullet Security Podcast

On the 12th episode of The Silver Bullet Security Podcast, Gary talks with Becky Bace, Advisor to Venture Capital firm Trident Capital. Becky spent twelve years at the NSA working on intrusion detection and cryptography from 1984 until 1996, followed by a stint at Los Alamos National Laboratory. Gary and Becky discuss growing up in rural America, explosives, and Becky’s Jimmy Hoffa sponsored college funding situation. They also talk about the evolution of security cirricula in academia, rampant commercialization of computer security, Becky’s involvement in tracking down the notorious Kevin Mitnick, vicodin-induced creativity, and eclectic music.
French Pick Ubuntu
When French MPs and their assistants return from their summer break this June, they will conduct parliamentary business on PCs running Ubuntu. From the next session of parliament, 1,154 desks will feature the Linux-based PCs.
More here.
Friday, March 09, 2007
The 50 Most Important People on the Web

Personal favorites:
31. Bruce Schneier - Cryptographer
32. Kevin Rose - Founder, Digg
47. Leo Laporte - Creator, This Week in Tech (TWiT) podcast
Who did they miss?
Thursday, March 08, 2007
Independent Comparatives of Anti-Virus software
Surprise! Microsoft's OneCare was on the bottom of the list...
BTW when the was the last time you had a virus on your system? Seems that a little common sense can go a long way in keeping a system clean, but don't tell the AV vendors that.
Network Information with Javascript
Sunday, March 04, 2007
Police use MySpace

As police continue searching for a suspect in four bank robberies across Arkansas, one local department has taken the unusual step of creating the man a profile on the social networking Web site MySpace, hoping someone will recognize him.
Story here.
Saturday, March 03, 2007
True? BBC Reported Building 7 Had Collapsed 20 Minutes Before It Fell

More here.
Friday, March 02, 2007
Friday Fun - School Security
As authorities stormed into a middle school office to arrest an alleged meth-dealing principal inside, they found an even more surprising scene inside.Story here.
Sources said 50-year-old John Acerra, of Allentown, was naked and watching gay pornography when they arrived at Nitschmann Middle School in Bethlehem to arrest him on Tuesday.
Acerra also had sex toys, drugs, cash and a pipe in his school office when authorities stormed his office, the sources added.