Tuesday, June 22, 2010
Gold dust or Nuggets? A Hackers Tell
›
After a hard day's conferencing, security folks will typically end up in the hotel bar and, with odds often appearing to be in excess of...
Saturday, May 29, 2010
Anti-FUD FUD
›
Like the cycling of the moon, the security industry also exhibits periods of waxing and waning on particular issues. At the moment it looks ...
Monday, May 10, 2010
Rusting Credit Cards
›
OK, so you know that the back of your credit card has a magnetic stripe on the back of it. Did you know that it can store three tracks of da...
Sunday, May 9, 2010
Military Grade Malware (Part 1)
›
Not all malware is created equal. Of the 50k-80k new and unique malware samples received daily by the mainstream anti-virus companies, there...
Paste Bin & Card Dumps
›
Trawling around for stolen credentials and identity information - in the form of criminal cast-offs and sales samples - can be an interestin...
Tuesday, May 4, 2010
Botnet Operations: Running a Campaign
›
"One bullet, one kill" - isn't that some kind of sniper saying from the movies? If you're a professional botnet operator y...
Monday, April 26, 2010
Opt-in Botnets
›
As businesses and governments have moved their presence online, protesting and other public forms of disaffection against them have followed...
1 comment:
Monday, March 29, 2010
Recruiting: Threat Analyst @ Damballa
›
OK readers, I've got a roll open right now in the Damballa research team for a Threat Analyst. If you think you know your Bot's from...
‹
›
Home
View web version