Month: July 2006
SecurityFocus’ Robert Lemos published a number of months back an article in which he suggests that naming viruses is currently a lost cause. In the article, he mentioned how numerous security companies had warned their customers about a computer virus that had been programmed to […]
Read more
I regularly use wireless networks at meetings, conferences, airports, hotels, workshops, coffee joints, friend’s homes (and mine) – as I suspect is the case with most folks these days. I often leave Dug’s passive listening toolkit running in the background (where network usage licensing/agreements implicitly […]
Read more
The Evil Bit! I’ve been thinking about RFC-3514 often over the last few quarters; that and what should be its cousin: the Stupid-Bit. I know you’re shaking your head now – poor CTO…too much time in the sales/marketing dunk tank. I’m serious, though. Not that […]
Read more
HD Moore recently released a malware search engine. Dan Hubbard and the team at Websense had released an announcement that they had been able to use Google to find malware specifically. HD Moore was evidently frustrated that they didn’t get a copy of the code […]
Read more
Back in November 2005, Bruce Schneier wrote about a Western Union-related fraud. This week, I was exposed to some of the techniques used by eBay sub-geniuses and their use of Western Union. I deal primarily in buying and selling rare and hard-to-find comics on eBay, […]
Read more
Over the weekend Ed Vielmetti pointed out to me that Zooomr had been under a DDoS attack as they were preparing to roll out their 2.0 site. As discussed on their blog, the Zooomr guys describe what’s going on (well, in very limited detail): Well […]
Read more
In our shrill world of paranoia where vendors clench their general counsel’s arm tight enough to powder walnuts, it’s not surprising that End User Licensing Agreements (EULAs) continue to grow in absurdity. With the continued prevalence of free OS’, hardware vendors are undoubtedly under increased […]
Read more
A question we’re asked by many an interested party. I’ll give you my perspective on what it’s like to be a part of the Arbor Security Engineering & Response Team (ASERT). It’s Microsoft patch Tuesday, and that just adds to the workload. We’re busy here […]
Read more
I don’t know who dislikes RFPs more: vendors who have to answer them or customers who have to create them and then read all the responses. There aren’t too many things that waste more time than RFPs. I understand the original premise of these: they […]
Read more
There will always be jobs in security. Why, you ask? Because the world has an endless string of bad people, ruthlessly ambitious people, desperate people, or just people willing to go to any length to show that they can do things that they are not […]
Read more