by Alex Eckelberry | Dec 18, 2009 | Uncategorized
Laptop computers captured from insurgents in Iraq contained software that enabled them to intercept video feeds from the unmanned drones that are seeing expanded use in the Middle East, according to the New York Times.The drones, used by the U.S. military to monitor...
by Alex Eckelberry | Dec 17, 2009 | Uncategorized
The Internet Storm Center blog just ran a piece about a malware vector that hasn’t been discussed enough: the Google Cache.An ISC blog reader named Greg recounted that he was browsing for information, found a site that was down and pulled up the Google cached page to...
by Alex Eckelberry | Dec 17, 2009 | Uncategorized
Yesterday we blogged about the most recent rogue security product in the WiniGuard family, TheDefend. Patrick Jordan had observed that a new clone was appearing about every two days. Overnight the pace picked up and loyal blog reader Fatdcuk let us know about yet...
by Alex Eckelberry | Dec 17, 2009 | Uncategorized
China is putting in place rules that would require a formal paper-based application system for those seeking domain name registration. The change would allow only businesses that have been licensed by the state to register domains. Ostensibly the move is to stop the...
by Alex Eckelberry | Dec 17, 2009 | Uncategorized
The Wall Street Journal carried a piece about the theft of valuables from luggage and the luggage itself at airports. An increase seen in the last five years is being blamed on the bad economy and reduced security caused by cost-cutting measures. Airlines are not...