by Alex Eckelberry | May 31, 2008 | Uncategorized
You’ve probably heard of Race to Zero (if not, you can get the concept here).It has not been the most popular thing in the security industry. Eugene Kaspersky (one of the most respected individuals in the industry) was downright vehement against it, as others have...
by Alex Eckelberry | May 30, 2008 | Uncategorized
A new type of phish, which uses a form embedded in the email.This makes things easier: No phishing site to have to maintain. No browser-based phishing filters to worry about.This particular one posts to a account hosted in California. (The images are all pulled from...
by Alex Eckelberry | May 29, 2008 | Uncategorized
With Windows 7 on the roadmap, it would be a great opportunity for Microsoft to tweak UAC so that it actually makes sense. Personally, I think it’s vital from a standpoint of security.Ed Bott over at ZDNet weighs in on the issue. “I was all prepared to lay out my...
by Alex Eckelberry | May 29, 2008 | Uncategorized
Amidst a sea of Cialis ads, “enlargement” products, luxury watches and various malware scams, there is the occasional spam that truly leaves us scratching our heads. I figured I’d highlight a couple of them recently seen in our honeypots.Over-achieving parent...
by Alex Eckelberry | May 29, 2008 | Uncategorized
Our vote for best desktop hijack screen so far this year:The codec writers apparently didn’t have the installer ready, so they just run the Russian Windows Calc.exe when you download the fake codec trojan:And finally, not malware but we thought the image was...