Wednesday, September 30, 2009

Crooks, Trojans & Mules

Interesting report from finjan.

In the third issue of its Cybercrime Intelligence Report for 2009, Finjan shows how cybercrooks used a combination of Trojans and money mules to rake in hundreds of thousands of Euros and to minimize detection by the anti-fraud systems used by banks. After infection, a bank Trojan was installed on the victims’ machines and started communication with its Command & Control (C&C) server for instructions. These instructions included the amount to be stolen from specific bank accounts and to which money mule-accounts the stolen money should be transferred. The use of this Anti anti-fraud method signals a new trend in cybercrime.

Saturday, September 26, 2009

OWASP Podcast Series #41

David Rice, is an internationally recognized information security professional and an accomplished educator and visionary. For a decade he has advised, counseled, and defended global IT networks for government and private industry. David has been awarded by the U.S. Department of Defense for “significant contributions” advancing security of critical national infrastructure and global networks. Additionally, David has authored numerous IT security courses and publications, teaches for the prestigious SANS Institute, and has served as adjunct faculty at James Madison University. He is a frequent speaker at information security conferences and currently Director of The Monterey Group.


Friday, September 25, 2009

A Stick Figure Guide to the Advanced Encryption Standard (AES)

A very nice explanation of AES, even has example code with it...

Man sues BofA for "1,784 billion, trillion dollars"

More Friday Fun!

Dalton Chiscolm is unhappy about Bank of America's customer service -- really, really unhappy.

Chiscolm in August sued the largest U.S. bank and its board, demanding that "1,784 billion, trillion dollars" be deposited into his account the next day. He also demanded an additional $200,164,000, court papers show.

Reuters story here.

Friday Fun with the DataLoss database

The DataLoss folks have come with some fun ways of querying their data.

Start here.

Thursday, September 24, 2009

Couple's Lawsuit Against Bank Over Breach To Move Forward

So who is responsible the Bank/FI or the end user?

A U.S. District Court ruling in a lawsuit against a bank over a hacked online account has raised thorny questions about who's ultimately responsible for the breach of a customer's account.

An Illinois district court denied Citizens Financial Bank's request to dismiss a lawsuit that charges the bank was negligent in protecting a couple's bank account after their user name and password were stolen and used to pilfer $26,000 from their account. The ruling lets the couple, Marsha and Michael Shames-Yeakel, continue with their lawsuit, mostly based on their allegations that the bank failed to properly secure their account.

Full story here.

Tuesday, September 22, 2009

What Star Trek Predicts About The Future of Information Security

This is great and the future might be now...

Monday, September 21, 2009

ShmooCon 2010 - Registration

Important Dates and Deadlines

* November 1, 2009, Noon EDT - first round of ticket sales
* December 1, 2009, Noon EST - second round of ticket sales
* January 1, 2010, Noon EST - third and final round of ticket sales

Monday, September 14, 2009

Don't Copy That 2 (Official Sequel to Don't Copy That Floppy)

In this sequel to 1992's "Don't Copy That Floppy," MC Double Def DP continues his crusade against piracy in the digital age. Brought to you by SIIA (formerly SPA).

What do you think?

Thursday, September 10, 2009

Cyber War Gets Its Own Museum Show

The International Spy Museum in Washington plans will launch a cyber war show dubbed Weapons of Mass Disruption next month.

The show will be heavy on video interviews with folks such as Director of National Intelligence Dennis Blair; former Special Advisor to the President on Cyber Security Richard A. Clarke; Lee Hamilton, co-author of The 9/11 Commission Report; Sen. Christopher "Kit" Bond, vice chairman of the Senate Select Committee on Intelligence; and R. James Woolsey, former CIA director.

Story here.

Spy Museum

Tuesday, September 08, 2009

Vista/2008/Windows 7 SMB2 BSD 0Day

Is this not a one big "Well Duh"?

If you are not blocking 445 then... you have more problems than this one...

From SANS -

"We have received a report from Tyler that a vulnerability affecting Microsoft SMB2 can be remotely crashed with proof-of-concept code that has been published yesterday and a Metasploit module is out.

We have confirmed it affects Windows 7/Vista/Server 2008. The exploit needs no authentication, only file sharing enabled with one 1 packet to create a BSOD. We recommend filtering access to port TCP 445 with a firewall.

Windows 2000/XP are NOT affected by this exploit."

Monday, September 07, 2009

Free Book

Download Vulnerability Management for Dummies.

Friday, September 04, 2009

Have Skimmer, will Travel

Police in New Zealand have apprehended two Bulgarian nationals in Nelson overnight. The Bulgarians have been charged with carrying out data-skimming attacks on ATM machines in Nelson and Canterbury, the NZPA has reported on September 4. Reportedly, the police investigation is still ongoing, with authorities trying to determine whether the pair were successful in their scheme, and if so, to assess the damages.

More here.

Wednesday, September 02, 2009

Weaponizing the Web from DEFCON

Shawn Moyer and Nathan Hamiel spent some time last year looking at this problem as it related specifically to social networks. This year, they talk about a previously unnoticed attack vector for lots and lots of web applications with user-generated content, and releasing a handy tool to exploit it.

Shawn Moyer and Nathan Hamiel: Weaponizing the Web (DefCon 17) from Vim EeeeOOO on Vimeo.

Happy Birthday INET

September 2, 1969, ARPANET, the forerunner of INTERNET was developed when two computers at University of California, Los Angeles were connected on an experimental military network by a team at UCLA.

Wikipedia ARPANET Timeline
Copyright 2018 e2e Security. Powered by Blogger Blogger Templates create by Deluxe Templates. WP by Masterplan