In Helsinki, the police catched a car thief with the help of … a mosquito! They found a mosquito full of fresh blood in astolen car. They analyzed the DNA and it matched a bad guy already recorded in the police database. Pwned! ;-) Read the BBC News article.
Cc: Party or the Right Way to Use Email
I just received an official e-mail from a security appliance manufacturer. The message was an official communication about their products line. End of 2008 (almost 2009!), I’m really surprised how this communication was handled! First, a Word document was attached to the message. Why? Word documents may carry viruses or
PaulDotCom Goes TV (again)
Big fan of PaulDotCom for a long time, I listen to the Security Weekly postcast every week in my car (that’s the positive side of traffic jam in the morning ;-) They also broadcasted videos for a long time but the last episode was posted in May 2008. They are
Rogue/Hacked DHCP Server Detection Using Nagios
Beginning of this month, the Internet Storm Center published a diary about a new malware (called Trojan.Flush.M) detected by Symantec: Rogue DHCP servers. The malicious code was analyzed by Symantec. Once the machine infected, it sends fake DHCP offer packets using UDP ports 67 and 68 when another computer on
OpenVAS 2.0.0. is out
OpenVAS just announced the availability of its license-free scanner. The new release (2.0.0) comes with a lot of bugfixes and improvement. The most interesting are: Support of OVAL OIDs support (prefix: 1.3.6.1.4.1.25623) to identify all the vulnerabilities checks. The new support of OVAL (“Open Vulnerability and Assessment Language“) is a
Security from A to Z
Found on silicon.com: “Security from A to Z”. Click on the links below to find out more… A is for Antivirus B is for Botnets C is for CMA D is for DDoS E is for Extradition F is for Federated identity G is for Google H is for Hackers
The Dark Side of the Force…
The financial crisis will have negative aspects in all business. Security IT must be kept at the same level (even increased) but facts are there: budgets are frozen, etc… According to PricewaterhouseCoopers (PwC) analysts, there are risk to see jobless techies go to the “dark side of the force” and
Good Bye 2008…
2008 is almost gone and lots of “Top-ten” charts were already published. What happened during the last months? Top 10 Coolest Hacking Moments in 2008 2008’s top ten most-searched tech terms 10 Emerging Technologies 2008 Gartner Identifies the Top 10 Strategic Technologies for 2008 Top 10 Most Pirated Games of
ISSA Belgian Chapter Event: New ISSA event: Microsoft Windows Server 2008
Back from Microsoft Belgium where occurred an ISSA Belgian Chapter event about security of Microsoft Windows Server 2008. The speaker, Ronny Bjones, started with some historical facts about the Microsoft products and security. He explained why Microsoft had lot of security issues in the past, due to the way developers
Minimal Security
Credit: http://flickr.com/photos/fboyd/2494909325/.