Author Archives: Slippery Slim

Cyberweapons: Bold steps in a digital darkness?

Cyberweapons: Bold steps in a digital darkness? In the world of armaments, cyber weapons may require the fewest national resources to build. That is not to say that highly developed nations are not without their advantages during early stages. Countries like Israel and the United States may have more money and more talented hackers. Their software engineers may be more skilled and exhibit more creativity and critical thinking owing to better training and education. However, each new cyberattack becomes a template for other nations — or sub-national actors — looking for ideas. Stuxnet revealed numerous clever solutions that are now part of a standard playbook. A Stuxnet-like attack can now …

Continue reading

Posted in Thoughts.

Affiliate Downloader

Don’t really have an article to comment on this time. Instead let me add a little something that jumped in my lap. Or maybe you could say, jumped on my computer. It may be that you too run into this and after reading about it here, you will have the answers on how to remove it. My little episode began with my antivirus running out. So I thought I would try another with an equivalent level of protection. Sadly, the new antivirus would not install without removing the firewall in place. I started then just to go back to what I knew worked except trying new stuff is how you …

Continue reading

Posted in Selected Software.

After the hack

After the hack According to published reports, Visa and MasterCard recently warned card-issuing banks that a third-party payments processor suffered a security breach. This breach may have exposed the Track 1 and Track 2 data needed to counterfeit cards. The compromise, according to both KrebsonSecurity and The Wall Street Journal, happened sometime between January 21 and February 25. It’s not clear if attackers had access for that entire period. Source Here is where the driving force is to tame the internet. To turn it into the merchant’s wet dream. The idea of having a store with unlimited shelf space, without having to meet all the requirements of a brick and …

Continue reading

Posted in Thoughts.

ABCs for ISPs

ABCs for ISPs The Anti-Bot Code of Conduct for Internet Service Providers A Voluntary Industry Code to Help Reduce End-User Bots The Federal Communications Commission’s CSRIC Working Group #7 released a new voluntary code of conduct for ISPs and network operators on March 22, 2012 as a cooperative industry-government initiative. The Anti-Bot Code of Conduct for Internet Service Providers (ABCs for ISPs), included in the FCC CSRIC Final Report of March 2012 includes the opportunity for participating network operators to be listed publicly on their own and official industry websites. Source The spammers and bot-herders will have to come up with a new method should this take hold. Those ISPs …

Continue reading

Posted in Thoughts.

Critical Windows bug…

Critical Windows bug could make worm meat of millions of high-value machines Microsoft has plugged a critical hole in all supported versions of Windows that allows attackers to hit high-value computers with self-replicating attacks that install malicious code with no user interaction required. The vulnerability in the Remote Desktop Protocol is of particular concern to system administrators in government and corporate settings because they often use the feature to remotely trouble-shoot e-mail servers, point-of-sale terminals and other machines when they experience problems. RDP is also the default way to manage Windows machines that connect to Amazon’s EC2 and other cloud services. That means potentially millions of endpoints are at risk …

Continue reading

Posted in Thoughts.

Nortel hit by suspected Chinese cyberattacks for a decade

Nortel hit by suspected Chinese cyberattacks for a decade The hackers – who appeared to be based in China – had unfettered access to the former telecommunications giant as far back as 2000, according to Brian Shields, a former Nortel employee who launched an internal investigation of the attacks, the Wall Street Journal reports. They “had access to everything”, Shields told the Journal. “They had plenty of time. All they had to do was figure out what they wanted.” Source A decade ago, the Chinese were stepping up their internet attacks as a way to steal patented technology, insider information, industrial sabotage, and research theft. Here it appears we had …

Continue reading

Posted in Thoughts.

Facebook malware scam takes hold

Facebook malware scam takes hold A “worrying number” of Facebook users are sharing a link to a malware-laden fake CNN news page reporting the U.S. has attacked Iran and Saudi Arabia, security firm Sophos said Friday. If users who follow the link then click to play what purports to be video coverage of the attack, they are prompted to update their Adobe Flash player with a pop-up window that looks very much like the real thing. Those who accept the prompt unwittingly install malware on their computers. Source Malware writers go where the crowds are. It’s always been so and one reason why Linux has far less to worry about …

Continue reading

Posted in Thoughts.