Microsoft cloud-computing service offers federal agencies

New Microsoft cloud-computing service offers federal agencies a high level of security, including biometric access control and fingerprinting for background checks.http://news.cnet.com/8301-27080_3-10459301-245.html?part=rss&subj=news&tag=2547-1_3-0-20 -Urs  

0

MS: What We Know (and Learned) from the Waledac Takedown

Very interesting article from the MSRC: Recently, following an investigation to which various members of the MMPC contributed, Microsoft’s Digital Crimes Unit initiated a takedown of the Waledac botnet in an action known as Operation b49, an ongoing operation to disrupt the botnet for the long term.  To effectively counter a botnet like Waledac, we…

0

Pentagon Searches for ‘Digital DNA’ to Identify Hackers

One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying to fix that, with a new effort to develop the “cyber equivalent of fingerprints or DNA” that can identify even the best-cloaked hackers. http://www.wired.com/dangerroom/2010/01/pentagon-searches-for-digital-dna-to-identify-hackers/ -Urs  

0

Report details hacks targeting Google and others

It’s been three weeks since Google announced that a sophisticated and coordinated hack attack dubbed Operation Aurora recently targeted it and numerous other U.S. companies. Now a leading computer forensic firm is providing the closest look so far at the nature of the attacks, and attackers that struck Google and others. http://www.wired.com/threatlevel/2010/02/apt-hacks/ -Urs  

0

Slow And Silent Targeted Attacks On The Rise

And another one in the same direction: The most determined cyber criminals don’t necessarily work fast when they breach a network, and their infiltration is often silent and undetectable. But it’s this brand of “low and slow” targeted attack that can also be the most deadly, security experts say:http://www.darkreading.com/security/attacks/showArticle.jhtml;jsessionid=UFNEPFUNCGARMQSNDLPSKH0CJUNN2JVN?articleID=212701434 Have alook also at the following blogpost…

0

The Open Computer Forensics Architecture (OCFA)

The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency. The main goal is to automate the digital forensic process to speed up the investigation and give tactical investigators direct access to the seized data through an easy to use search and browse interface. The Open…

1

Microsoft Malware Removal Tool: Two million password stealers fingered

Microsoft’s Malicious Software Removal Tool – a program that removes malware from Windows machines – detected password-stealing software from more than 2 million PCs in the first week after it was updated. One password stealer, called Taterf, alone was detected on 700,000 computers in the first day after the update. That’s twice as many infections…

1

New Phishing/Storm Worm Variant Spreading

US-CERT has received reports of new phishing activity, some of which has been linked to Storm Worm. The latest activity is centered around messages related to the recent earthquake in China and the upcoming Olympic Games. This Trojan is spread via an unsolicited email message that contains a link to a malicious website. This website…

1

Advances in BitLocker Drive Encryption

What’s new in Windows Vista SP1 or Windows Server 2008 Bitlocker? http://technet.microsoft.com/en-us/magazine/cc510321.aspx Urs  

0

The evolution of CyberCrime Inc

There is no storefront or corporate headquarters for Cybercrime Inc., but savvy salesmen in a murky, borderless economy are moving merchandise by shilling credit card numbers – “two for the price one.” “Sell fresh CC,” promised one salesman who offered teaser credit card numbers for samples in New Jersey and Canada. “Visa, MasterCard, Amex. Good…

1