Monthly Archives: March 2009
Honeynet Project Discovered a hole in Conficker
Researchers at The Honeynet Project has discovered a vulnerability in the Conficker that makes it easy to detect,The Conficker adds changes in Windows that can be detected remotely by using a various scanning methods which is already integrated into different
Conficker.C Overview
Researchers at SRI International updated their Conficker paper. They have provided a very useful analysis of the Conficker malware. The last variant of Conficker, referred to as Conficker C leaves as little as 15% of the original B code base
Bios rootkit infection
Researchers at Core Security Technologies demonstrated how to creat a new rootkit which is even after formatting the hard disk impossible to remove, this malicious code is injected into the low level system of the target machine (BIOS firmware). They
BBC team exposes cyber crime risk
Software used to control thousands of home computers has been acquired online by the BBC as part of an investigation into global cyber crime. The technology programme Click has demonstrated just how at risk PCs are of being taken over
Damn Vulnerable Linux – DVL – Another V.A Platform
Damn Vulnerable Linux is another interesting platform for pen testing and vulnerability assessment, it is created for training purposes to IT-Security professional during a university lessons by the IITAC (International Institute for Training, Assessment, and Certification) and secure software Engineering
Golden rules of safe internet shopping
A very interesting article that Andy Dalrymple, managing consultant information risk management at Global Secure Systems (GSS) posted, this article provides a twelve golden rules to safely shopping online. you can find the Tips Here.