twitter facebook rss

Time to reject GCHQ and rebuild a Free Albion

Posted by Kevin on December 18, 2014

One of my favourite companies is F-Secure. F-Secure is a company that hasn’t just sat back and said, ‘Oh, how terrible – governments are spying on us.’ F-Secure is fighting back by developing the technology that makes it more difficult for governments to spy on people. I recently asked F-Secure’s Sean Sullivan why his company […]

Your free adult toy is the Angler EK

Posted by Kevin on November 6, 2014

Demonstrating the continuous intellectual battle between cyber attackers and security researchers, Malwarebytes has an interesting post on a newly found malvertising sample. The ad, featuring, is placed by the agency AdXpansion — which, judging by the home page (the clue is in the ‘X’) specializes in ads in or for porn sites. But this […]

ITsecurity Daily News: 08/29/2014

Posted by Kevin on August 29, 2014

The ITsecurity daily security briefing: Friday, August 29, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News Someone is telling porkies Bloomberg followed up its first story on […]

Phish for supper?

Posted by Kevin on August 21, 2014

No thank you, I don’t think I’ll bother… But if any security researcher (don’t try this at home, chaps) would like to tell me what lies behind http://vekokar dot com/Gmail-webmail.html (the actual link disguised as Click here) I’d be interested to know.  

Magnitude – an exploit kit par excellence

Posted by Kevin on August 11, 2014

Trustwave has had sight of the inner workings and underlying infrastructure of the Magnitude exploit kit – the coming EK that is rapidly filling the gap left by Blackhole. As Blackhole declines following the arrest of its developer, Paunch, so Magnitude is increasing in popularity. Although not brand new, detailed knowledge has hitherto been sparse: its […]

TOR: blocking C&C servers and cybercriminals

Posted by Kevin on July 27, 2014

TOR is increasingly being used by cybercriminals. Its ability to anonymize people and places makes it an attractive place to hide nefarious activity — and things like malware C&C servers. Just last week Kaspersky Lab warned that it had traced a new and sophisticated ransomware trojan (dubbed Onion for obvious reasons) to a lair in […]

Of paedophiles, cybercriminals and surveillance

Posted by Kevin on July 18, 2014

The European cops have been busy this week. First the UK’s NCA announced the arrest of 660 suspected paedophiles (Wednesday); and then (Thursday) Europol announced the dismantling of a Romanian cybercrime network. I don’t want to make too much of it being the same week in which the UK government bulldozes through a new cyber […]

Black hats now concentrate on zero-day exploits

Posted by Kevin on July 17, 2014

Microsoft has examined the first exploitation of known vulnerabilities in its products over the last eight years. It finds that exploits peaked in 2010 with just under 70 exploits; but has reduced dramatically since then to just 20 in 2013. It separated the exploits into three categories: zero-day, exploits, exploits appearing within 30 days of […]

Trustwave guarantees zero malware in new MSS service

Posted by Kevin on July 15, 2014

And that includes zero zero-day malware. So Trustwave is guaranteeing what many security experts believe is impossible – to completely prevent any malware infection. Strictly speaking, this is not a ‘guarantee’. In law, a guarantee is a pledge to be responsible for debts incurred through contractual failure. Trustwave is not offering to be responsible for […]

Trend Micro says Ibario is behind Sefnit

Posted by Kevin on July 12, 2014

You may recall that last year TOR suffered a sudden spike in users. First thoughts were that it might be some sort of out-of-control FBI action against the anonymity service. It wasn’t; it was the effect of a botnet: MEVADE/SEFNIT. MEVADE/SEFNIT is delivered via an adware mechanism and engages in click fraud and bitcoin mining. […]