security | Page 11


I decided it was high time I changed my car, well it was either that or wash it. So not being a car-o-phile I didn't have a specific model in mind so decided to head to that area of down where all the showrooms are located. I gave the GM dealer a miss, their financial position seems way too exciting for me to come involved in just at the moment, I wish them luck. I pick a showroom based largely on reputation and anecdotes and set about selecting a model that I thought would suit, a wheel on each corner, the right number of seats. Much discussion... [Read More]
by RSS Darren Turnbull  |  Jun 03, 2009  |  Filed in: Security Research
Tags: security utm
We are entering (arguably we have already entered) a digitally bound world where business, service and information flow is bountiful. In parallel, threats have been very active: we have seen a constant increase in malicious code even after a heavy spike in 2007. This increasing trend has carried over into 2009. Most of this increase is simply a flood of variants using packing techniques, server side polymorphism, obfuscation, etc. However, there are always new threats coming out to play. Scareware, ransomware, social networking worms, mobile platform... [Read More]
by RSS Derek Manky  |  Apr 16, 2009  |  Filed in: Security Research
Our March 2009 Threat Landscape Report is now available, recapping a month of threat activity from exploits and malware, to spam. Here are some key movements from the report along with comments: After a year long battle, W32/Virut.A finally lands in top spot - surpassing Netsky. This parasitic file infector proves to be quite virulent, and has generated enough activity to land in our malware top 10 for twelve solid months. On top of infecting multiple local files on a PC, the virus can spread through file shares and/or removable media such as USB... [Read More]
by RSS Derek Manky  |  Mar 27, 2009  |  Filed in: Security Research
Over the past two years, rarely did a worm get as much attention that Conficker (aka Downadup) is getting now. Its last variant, the infamous W32/Conficker.C, which surfaced in early March and is set to time-bomb on April 1, is literally all over the media. Of course, its features are well known and documented and some papers (such as SRI's excellent analysis and a blog post from Sourcefire) even give interesting insights on the reverse engineering process. Indeed, while understanding the behavior of the malware is important to most people, learning... [Read More]
by RSS Rex Plantado  |  Mar 26, 2009  |  Filed in: Security Research
The title of this post could be a nickname for the new breed of Internet worms that attack our networks today. Every new big worm or virus finds a more clever way to disseminate faster than his predecessors. But also the payloads are potentially more destructive, innovating on that side too… Does this have a direct relationship with faster computer power on the desktops and bigger bandwidth available? Of course! We are not reinventing the wheel, here. But there is another factor that is sometimes not taken into account: the growing population... [Read More]
by RSS Martin Hoz  |  Mar 19, 2009  |  Filed in: Security Research
I am sure if you have kids you will recognize this issue. Their friends come round, clutching laptops; we live in a modern age. Of course these friends just absolutely need to get online. That WPA2/TKIP solution and MAC filtering you just had to have is causing problems so "click, click, click" it's now WEP128 and you put the SSID and key on the fridge. Now everyone can be online, and they can leave you alone. Sometimes this security stuff can just get in the way of watching a good movie. Let's fast forward: you're an important guy, you're sat... [Read More]
by RSS Darren Turnbull  |  Mar 12, 2009  |  Filed in: Security Research