Select Page

Social media and privacy

Shelly Palmer blogs about privacy and Twitter, as regards marketing companies mining the data:But those systems pale in comparison to the kinds of data we’re giving about ourselves on personalized media like social networks and Twitter. Imagine if through some sort of...

No, we’re not at worm stage… (yet)

Correction: There is a worm component. (Yes, the trojan itself isn’t a worm. But that overlooks the behavior of a dll, a dll dropped by Gimmiv, which is a worm. Now, that doesn’t mean we’re at a SQL Slammer type worm stage. This Trojan has to get...

Just some comments on MS08-067

I was stuck in meetings today and didn’t get a chance to write much more than I did earlier.Just some quick notes on MS08-067.– We have samples in-house of the trojans in-the-wild that are being used in targeted attacks, taking advantage of this exploit. These are...

Comments: There is no conspiracy

After moving to moderation (because of so much spam) I, well, err, accidently deleted a number of comments. Some are already suspecting a conspiracy. But no, that’s not the case. Just a simple screw-up.If you’ve posted a comment in the past couple of days and you see...