Hmmm. Is this the same Yahoo! that also isn't aware that they
are unwittingly hosting hundreds of phishing sites?
http://news.com.com/Spamhaus+Yahoo+major+phishing+site+host/2100-1029_3-5850773.html
- ferg
-- n3td3v <[EMAIL PROTECTED]> wrote:
On 10/14/05, James Tucker <[EMAIL PROTECTED]> wr
Get in line:
http://www.eeye.com/html/research/upcoming/20050915.html
More:
http://www.eeye.com/html/research/upcoming/index.html
- ferg
-- "'FoR ReaLz' E. Balansay" <[EMAIL PROTECTED]> wrote:
Hello all!
My systems relevant info:
Windows XP SP2 fully patched
Mcafee VirusScan 7.1 Engine 4.
Dude, let's try ASCII messages in the future, okay? :-)
In any event, we all know now:
http://www.frsirt.com/english/advisories/2005/1596
- ferg
ps. Hey, TheGesus, not picking on you -- you know better. ;-)
--
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
[EMAIL PR
Yep:
%ping www.securityfocus.com
Pinging www.securityfocus.com [205.206.231.15] with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 205.206.231.15:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
%traceroute www.secu
Think that's bad?
http://www.boingboing.net/2005/08/25/la_record_producer_k.html
- ferg
-- Technica Forensis <[EMAIL PROTECTED]> wrote:
On 8/24/05, winsoc <[EMAIL PROTECTED]> wrote:
> I seriously cannot believe that someone would be so mundane in
> thinking that people would reply to this.
I
It's not that simple.
Why such success with a worm targeted at specific
vulnerabilities in Win2k?
I'll tell you why -- the answer is spelled out (correctly)
in an article written by Ina Fried in a June 28th, 2005,
C|Net News article entitled "Windows 2000 moves to the
back burner", which discusse
See:
http://www.f-secure.com/weblog/#0631
It could be any one of 11 variants at this point...
- ferg
-- "Jan Nielsen" <[EMAIL PROTECTED]> wrote:
I was at a customer today with this problem, initially their network was
acting up and some ppl, couldn't logon to the servers in the morning.
Perhaps the same problem as CNN, ABC, etc:
http://www.cnn.com/2005/TECH/internet/08/16/computer.worm/index.html
- ferg
-- David Wilde <[EMAIL PROTECTED]> wrote:
A buddy of mine who's fiance works for Disney just told me that they
have sent everyone home for the day. When I say everyone I me
...and let me remind you, Mr. Terranson, that the majority
of information that originates from SANS (primarily from the
ISC Daily Handlers Diary, and DSHield.org), is far more
substantive that the juvenile B.S. that goes on in this
forum most of the time.
But, of course, you knew that already, rig
...and speaking of MD5, this showed up on Bruce Schneier's
Blog this morning:
[snip]
A team of Chinese maths enthusiasts have thrown NSW's speed cameras system into
disarray by cracking the technology used to store data about errant motorists.
[snip]
The MD5 Defense
http://www.schneier.com/blo
*plonk*
--filtered--
[snip]
Jason Coombs
[EMAIL PROTECTED]
[snip]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Hello? I can't believe I'm getting suckered into this...
Wikipedia:
Trojan horse (computing): In the context of computer
software, a Trojan horse is a malicious program that
is disguised as legitimate software. The term is derived
from the classical myth of the Trojan horse.
http://en.wikipedia.or
The closest approximation of "100% network security" comes
in the form of a pair of wire-cutters...
- ferg
p.s. Network security is an architecture, and most importantly,
it is a frame of mind...
-- "Charles Heselton" <[EMAIL PROTECTED]> wrote:
Although Daniel's comments may be tongue-in-chee
13 matches
Mail list logo