Sunday, September 30, 2007

Weekend Reading

The Case of the Recent Cross Carrier SPAM

Interesting time for mobile messaging and the threats they are going to face. What caught by eye was the title ‘Cell Phone Users Experience Text Spam’. We’ve discussed this before with the most interesting incident being when one operator took legal action.

Take a look HERE.

==================================================================
Patching. Is it always with the best intentions?

Over the years, malicious software has attempted every trick in the book when it comes to hooking into an operating system, not only to remain persistent at the time of execution but also beyond system reboots.

The forthcoming paper will describe how hooking into the operating system has changed over the years, including some examples of the most 'interesting' methods from MSDOS, early Windows versions and in to present day Windows Vista. Such, somewhat more historical, methods include manipulations of hard disk partitions, critical operating system files and trivial system registry modifications whilst injecting code into running processes, hooking critical startup processes, creating system services and patching memory of running processes are much more contemporary methods.

Take a look HERE.

==================================================================
Million yuan job awaits jailed worm author

Want a high paying job? Perhaps a little online vandalism will help your chances. A network company in eastern China has offered a job paying a million yuan (US$133,155) a year to Li Jun - the inventor of the most destructive computer virus in China - although he was sentenced to four years in prison yesterday.

Take a look HERE.

==================================================================
TrafficMaster sells clients' info to UK.gov

Noted UK news brand the Daily Mail served up a somewhat error-speckled tech scoop last night, with news that a government "'spy in the sky' system" is involved in a "secret 'Big Brother' operation... allowing officials to pinpoint the exact location of thousands of vehicles".

Take a look HERE.

==================================================================
Security Roundtable: Do we have privacy anymore?

It's funny taking part in a conversation like this; We all pretty much agree that the average internet user is more of a danger to themselves than most companies are. Sites like Facebook and MySpace encourage people to put their every little factoid out there where anyone can see it, and people are willing to give up the most sensitive information if it will get them a slightly better shopping experience or a free candy bar.

Take a look HERE.

==================================================================
Fraud police buckling under mountains of data

Fraud investigators are struggling to cope with vast quantities of data sent to them by financial institutions, meaning some crimes may go uninvestigated or even unnoticed. The issue is prompting banks and other financial institutions to ask law enforcement and regulators to share with them more of the data they have about suspicious transactions, in order to better combat fraud.

Take a look HERE.

==================================================================
If users are a security threat, how do you manage them?

Question 1: "Argggghhhh. [My biggest problem is] managing the users who keep losing their damned handsets packed full of sensitive email addresses, emails etc. We talk a lot about technology, but aren't the users often the weakest link? What tips do the experts have for dealing with this?"

Take a look HERE.

==================================================================
The Trojan Money Spinner

Mika is the author of one of our analysis tools called Mstrings. The tool is part of the automation that assists us in identifying malware as Banking Trojans. His presentation, The Trojan Money Spinner, provides details on the nature of Banking Trojans and their function.

Take a look HERE.

==================================================================
5 things I've learned about privacy

As founder of the Ponemon Institute, a privacy and business ethics think tank, Dr. Larry Ponemon worries society will give up on privacy ideals as protecting personal data becomes harder.

Take a look HERE.

==================================================================
Why Microsoft must abandon Vista to save itself

While Vista was originally touted by Microsoft as the operating system savior we've all been waiting for, it has turned out to be one of the biggest blunders in technology. With a host of issues that are inexcusable and features that are taken from the Mac OS X and Linux playbook, Microsoft has once again lost sight of what we really want.

Take a look HERE.

0 Comments:

Post a Comment

<< Home