New Zealand teenager convicted over international cyber crime ring
,----[ Quote ]
| Owen Thor Walker, 18, known by his online name "AKILL," was involved in a
| network accused of infiltrating 1.3 million computers and skimming millions
| of dollars from victims' bank accounts.
`----
http://news.smh.com.au/new-zealand-teenager-convicted-over-international-cyber-crime-ring/20080301-1vzs.html
Internet has a garbage problem, researcher says
,----[ Quote ]
| Somewhere between 1 percent and 3 percent of all traffic on the Internet is
| meaningless packets of information, used in distributed denial of service
| attacks (DDOS) to knock Web sites offline.
`----
http://www.linuxworld.com.au/index.php/id;1488056707
That's an artificial boost for IE/Win32 in Web 'stats' (as in lies and damn
lies).
Yesterday:
No April Fools'--Storm worm is back
,----[ Quote ]
| The compromised computer will then install the downloaded file as C:
| \WINDOWS\aromis.exe. Nazario reports that the botnet file opens the firewall
| using the netsh firewall set command, makes a lot of outbound connections,
| then listens on a random UDP port.
`----
http://www.news.com/8301-10789_3-9906880-57.html?part=rss&subj=news&tag=2547-1_3-0-20
Last week:
With Vista breached, Linux unbeaten in hacking contest
,----[ Quote ]
| The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on
| the last day of the contest; but it was Linux, running on a Sony Vaio, that
| remained undefeated as conference organizers ended a three-way computer
| hacking challenge Friday at the CanSecWest conference.
`----
http://www.linuxworld.com/news/2008/032908-with-vista-breached-linux-unbeaten.html?fsrc=rss-linux-news
Recent:
What spooks Microsoft's chief security advisor
,----[ Quote ]
| Speaking at the Boston SecureWorld conference Wednesday, the 19-year
| Microsoft veteran whose job includes protecting enterprises, developers and
| Microsoft itself said there actually is plenty of good news on the security
| front. For example, his outfit scans a half million devices (with customer
| permission) per month and in the first half of last year saw the first
| period-over-period decline in new vulnerabilities disclosed across Microsoft
| and non-Microsoft software since 2003.
|
| However, 3,400 new vulnerabilities were discovered and “it’s still a big
| number,” Arsenault says. “So if vulnerability rates are down, where are
| they?”
`----
http://www.networkworld.com/news/2008/032608-microsoft-security-concerns.html
Websense Security Labs first to discover vulnerability within Microsoft Office
,----[ Quote ]
| This vulnerability allows code execution within an Excel document without the
| knowledge of the user.
`----
http://www.itweb.co.za/sections/software/2008/0803270807.asp?A=VIR&S=Virus%20Watch&O=FPIN
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
|
|