by Alex Eckelberry | Aug 15, 2009 | Uncategorized
“Zombies are a popular figure in pop culture/entertainment and they are usually portrayed as being brought about through an outbreak or epidemic. Consequently, we model a zombie attack, using biological assumptions based on popular zombie movies. We introduce a basic...
by Alex Eckelberry | Aug 14, 2009 | Uncategorized
NSS Labs has posted the results of its testing of the big six browsers for their ability to repel social engineering malware and phishing attacks. “The results are based upon empirically validated evidence gathered by NSS Labs during continuous 24×7 testing...
by Alex Eckelberry | Aug 14, 2009 | Uncategorized
Jose Nazario, writing on the Arbor Network Security blog “Security to the Core,” has described a botnet that uses Twitter as a command-and-control channel. The bot owner sends update information in a tweet and RSS feeds send it to the botnet.The tweeted update...
by Alex Eckelberry | Aug 14, 2009 | Uncategorized
No, that headline isn’t from the Onion.Entire blog post here.Xinhua story from July 16 here.Sometimes a big story is eclipsed by a larger one. This is one of them.The fact that China banned electroshock therapy for Internet addiction showed up in the later paragraphs...
by Alex Eckelberry | Aug 13, 2009 | Uncategorized
The Chinese Minister of Industry and Information Technology, Li Yizhong, has said that the fiat that all computers sold in his country after July 1 were required to have Green Dam Internet censoring software was just a great big misunderstanding.Green Dam will be...