Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: News

Security consortium creates guidelines

Posted on January 31, 2006December 30, 2021 by admini

“Few product testers currently document their test samples or methodology,” the companies said in a statement. “Many use very small sample sets in their testing environments. As a result, there is no distinguishable benchmark for comparison.” The software makers are part of a larger organization, called the Anti-Spyware Coalition, which is working to standardize industry terms and technology for battling spyware.

Next on the group’s agenda: Defining threat-naming conventions, intelligence-sharing best practices, and emergency information distribution guidelines. The group says it will use definitions already created by the Anti-Spyware Coalition.

http://www.zdnetindia.com/zdnet2005/mediaturf/top_728x90_1.html

Read more

Good worms back on the agenda

Posted on January 27, 2006December 30, 2021 by admini

The topic of whether self-propagating code can have a good use has cropped up occasionally among researchers in the security community. In 1994, a paper written by antivirus researcher Vesselin Bontchev concluded that ‘good’ viruses are possible, but the safeguards and limitations on the programs would mean that the resulting code would not resemble what most people considered a virus. Later attempts at creating ‘good’ worms have failed, however, mainly because the writers have not adopted many of the safeguards outlined in the Bontchev paper. The Welchia worm–a variant of the MSBlast, or Blaster, worm–had apparently been created to fix the vulnerability exploited by the MSBlast worm, but had serious programming errors that caused the program to scan so aggressively for new hosts, it effectively shut down many corporate networks.

Immunity’s research is the latest attempt to create a more rigorously conceived framework for creating worms that could spread across specific networks to find and report vulnerabilities. The research essentially offers two advances, a strategy for the controlled propagation of worms and a framework in which reliable worms could be created quickly, Aitel said. The nematode worms would have to get permission to spread by querying a central server for a specific digital token, which Aitel dubbed a nematoken, before spreading to a particular machine.

http://www.securityfocus.com/news/11373?ref=rss

Read more

Zero-day details underscore criticism of Oracle

Posted on January 26, 2006December 30, 2021 by admini

The database company should have fixed the issue in the latest critical patch update (CPU), but failed to do so, he said, adding that he believes the flaw is more significant than a privilege escalation issue fixed in less than three months by Oracle in the latest update.

After hearing about the conference presentation, Oracle slammed the researcher for releasing information about the vulnerability, saying that doing so puts its customers in danger. “We are always disappointed when researchers feel the need to publish details of vulnerabilities before a fix is available,” Duncan Harris, senior director of security assurance for Oracle, said in an interview with SecurityFocus.

At the Black Hat Security Briefings in Las Vegas last summer, networking giant Cisco and network protection firm Internet Security Systems filed suit against a security researcher for disclosing methods to run code on Cisco’s networking hardware.

On Wednesday, he posted a workaround for the vulnerability on SecurityFocus’ BugTraq mailing list. However, Oracle said that it studied the workaround proposed by Litchfield and found it inadequate. Other security professionals have also taken Oracle to task for its troubles in effectively handling security researcher and vulnerability disclosure.

http://www.securityfocus.com/news/11371?ref=rss

Read more

Phacing the Phacts on Phishing

Posted on January 24, 2006December 30, 2021 by admini

• Phishing scams’ increasing sophistication makes them tougher to spot; 70% of recipients say they initially thought the e-mails might be legitimate.

• 74% of consumers now use the Internet for transactions deemed sensitive, such as purchases and banking — and these are exactly the types of transactions that interest identity thieves who send out phishing e-mails.

• In January 2004, there were only 198 Web sites specifically created for phishing. By September 2005, there were more than 5,200.

http://www.bankinfosecurity.com/articles.php?art_id=114&PHPSESSID=dc6f96a8b3806f79be541fd18aa9c5a7

Read more

Online crime matures beyond adolescence

Posted on January 24, 2006December 30, 2021 by admini

“With increased security protection on most systems and stiffer penalties, we are seeing organized, committed, and tenacious profiteers enter this space. This means that attacks will be more targeted and potentially damaging.”

The recent guilty plea by a 20-year-old California man for compromising hundreds of thousands of computers to create a botnet and then selling access to those computers underscores the shift in cybercrime towards more profitable activity.

http://www.securityfocus.com/brief/116

Read more

Hacker PC networks getting harder to find

Posted on January 20, 2006December 30, 2021 by admini

The first legitimate bot, called Eggdrop, was written in 1993 by Robey Pointer and had a feature that allowed more control over IRC networks. As legislation emerged cracking down on spammers, those who ran botnets started pursuing more clandestine ways to continue their operations. Rather than deter hardcore spammers, it merely drove them further underground, said Mark Sunner, chief technical officer for MessageLabs.

Increasingly, botnet administrators have customised IRC commands, and many well-known commands that allowed for the remote querying of machines have been disabled, Hogan said.

Over a year ago, two viruses – Netsky and Bagle – battled it out, uninstalling and replacing each other on users’ computers. Law enforcement authorities have become more adept at putting together task forces to track down botnet admins.

They have countered by sticking to smaller groups of around 20,000 machines that are less likely to be detected as quickly, Sunner said.

http://www.techworld.com/security/news/index.cfm?NewsID=5205

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • …
  • 147
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme