Latest posts

Page 216

Grokster is back with their ad-supported version

Grokster had pulled their adware advertising supported version, offering only a paid-for version.  Now, the adware advertising supported version is back, offering loads of fun for all users. I thought maybe Grokster got religion.  After all, they lost with the Supreme Court.  People have been upset about adware in Grokster for quite some time. Wrong. […]

Continue reading

What enterprise AV product is your favorite?

We did a SunPoll™ on “Which enterprise AV product is your favorite”?  SunPolls are completely unscientific, but you can see the results here:

Continue reading

HTTP request smuggling

“HTTP Request Smuggling works by taking advantage of the discrepancies in parsing when one or more HTTP devices/entities (e.g. cache server, proxy server, web application firewall, etc.) are in the data flow between the user and the web server. HTTP Request Smuggling enables various attacks – web cache poisoning, session hijacking, cross-site scripting and most […]

Continue reading

Video downloads are where the bandwidth is

CacheLogic says video downloads make up 61% of file sharing traffic, audio downloads 11%. Now, of course, if you can get that Big Family Guy Video or that Big Fat Albert ad, you’re in good shape…’cause stuff comes with it!  Alex Eckelberry

Continue reading

Ma, I’m not playing GTA, I’m playing Solitaire!

Off topic: A “PSP hacker by the name of Matan phoned in to let us know he ported Bochs (an open-source x86 emulator) to the PSP…” Link (thanks to BoingBoing and Wonderland) So now you can run Windows 95 and Linux on your PSP! Thankfully, there isn’t a whole lot of spyware that runs on […]

Continue reading

UK users apathetic about ID theft

Unisys UK proclaims UK users are apathetic about ID theft To our neighbors (and erstwhile masters) across the pond, I’m happy to show you some examples of some UK people who got nabbed in the recently discovered ID theft ring. I don’t know if Unisys overstated the problem, but here is what they found: 11% […]

Continue reading

Vigilante group shuts down 15 banks

The LazyGenius writes about an article originally posted on CastleCops, on how Artists Against 419 have successfully shut down 15 banks through their vigilante activities.  As you may know, the infamous “Nigerian” scams (also called 411 or 419 scams, after the section of the Nigerian penal code that deals with these type of fraud schemes), […]

Continue reading

Does Government data mining violate the 4th ammendment?

The Fourth Ammendment of the Constitution protects against “unreasonable searches and seizures”.  (For the reasons why the Fourth was created, see this article). Over 50 federal agencies are either currently or planning to perform data matching and mining, in some cases for anti-terrorism reasons. So does this violate the Fourth? According to an article in […]

Continue reading

Other Person Syndrome

Are friends, family and boyfriends the root of spyware infestations? Security researchers the world over have noticed a trend when it comes to spyware and virus infections–the Other Person Syndrome (OPS).    Invariably, researchers who encounter a severely infested machine will notice that infection may not have necessarily come from the primary user. Instead, they […]

Continue reading

Zotob

Contrary to your probable first impression, Zotob is NOT the third bastard child of Haruk the Klingon.  In fact, it’s a nasty new worm that uses a vulnerability in Plug and Pray, allowing a remote attacker to control a Windows system remotely. Windows 2000 systems are particularly at risk, although XP and 2003 Servers have […]

Continue reading