Logo Description URL
60 Minutes - The Internet is Infected logo.png Lesley Stahl reports on computer viruses that propagate on the Internet and infect PCs, which enable their creators often called "cyber gangs" to learn the information they need to electronically rob bank accounts. (Includes heatmap visualizations.) link
A Study of Pushdo/Cutwail logo.png The Pushdo botnet has been with us since January 20071. The botnet is also known as Pandex or Cutwail. While it does not grab as many headlines as its attention-seeking peers such as Storm or Conficker, according to recent reports it is the 2nd largest SPAM botnet on the planet2 – sending approximately 7.7 Billion emails per day, making it single-handedly responsible for about 1 out of every 25 emails sent3 link
Asymmetric threats in cyberspace logo.png Security problems in the modern times are not anymore strictly military, but more philosophical and relating to the society. Therefore, in my speech today, I would like to delve more into philosophical issues. link
Botnet Communication Topologies logo.png A clear distinction between a bot agent and a common piece of malware lies within a bot’s ability to communicate with a Command-and-Control (CnC) infrastructure. CnC allows a bot agent to receive new instructions and malicious capabilities, as dictated by a remote criminal entity. This compromised host then can be used as an unwilling participant in Internet crime as soon as it is linked into a botnet via that same CnC. link
Cisco ASA's Botnet Traffic Detector logo.png Lori Hyde discusses the new Botnet Traffic Detector feature in the latest version of the Cisco ASA firewall. She explains how it’s supposed to work but wonders how it will fare in the real world. link
Cyberattacks: A call for collaborative action logo.png We need to develop a collective consciousness for coping with the growing menace of cyber attacks, says Stanton Sloane. link
Cybercime Riches Hard To Come By [ATTACH] Researchers from Microsoft say stolen goods offered for sale in IRC channels are tough to monetize, and industry estimates of underground profits are "exaggerated" link
E-Crime Survey 2009 logo.png The survey was conducted with the aim of stimulating conversation and debate at the Congress on a range of topics with direct relevance to the phenomenon of electronic and Internet-based crime. Between the 3rd February and the 13th March, 307 respondents from global businesses, law enforcement agencies, and government completed the survey. link
Facebook malware focusing on Bank of America [ATTACH] The perpetrators behind the recent Classmates and Facebook Malware incident are now refocusing their attack on Bank of America customers. link
Fordrop logo.png Forensic dropbox is a social tool for collaborative computer forensic analysis. It aims to bring analysts together and elevate crowd sourcing to cut down on investigation time link
Gumblar's 48,000 Compromised Domains [ATTACH] Last week one of the students in the UAB Computer Forensics program came to see me about a virus problem he'd been working on for a classmate. Her computer was infected with many malware programs, and my student, who works for me as a Malware Analyst, decided to take a look. link
Lessons from the Estonian cyber-attacks, [ATTACH] In response to the attacks, Estonia adopted a National Cyber Defence Strategy together with an Implementation Plan. One of the main principles is the importance of protecting the civilian critical information infrastructure. link
Lessons from the Russia-Georgia Cyber-War [ATTACH] With the benefit of hindsight, the Russian military campaign against Georgia last summer seems to offer conclusive proof that cyberwar has come into its own. link
Maltego logo.png Maltego is an open source intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way. link
NSA Iraqi Computer Attacks And U.S. Defense logo.png Gadi Evron on The Cyberwar Plan -article link
Terrorist Capabilities for Cyberattack: Overview and Policy Issues logo.png This report examines possible terrorists’ objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. link
Under Cyberthreat: Defense Contractors logo.png Northrop Grumman's info security chief addresses the "well-resourced, highly sophisticated" attacks against makers of high-tech weaponry. What kind of tools do you use to keep your network secure? We've focused a lot on…capabilities where you're capturing all traffic, not just bits and pieces of it. link
Visa, MasterCard In Security Hot Seat logo.png The House of Representative's Committee on Homeland Security took aim at a more accessible target: credit card companies like Visa and MasterCard (nyse: MA - news - people ), which are responsible for creating and enforcing the Payment Card Industry (PCI) standards that failed to prevent those breaches. "But I do want to dispel the myth once and for all that PCI compliance is enough to keep a company secure. It is not." link
Your Botnet is My Botnet [ATTACH] In this paper, we report on our efforts to take control of the Torpig botnet for ten days.Over this period, we observed more than 180 thousand infections and recorded more link
[edit] [csv] [zip]

Misc. Pointers



Linked in pages: Scada, Lessons from the Estonian cyber-attacks,, A Study of Pushdo/Cutwail, Fordrop, Your Botnet is My Botnet, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, E-Crime Survey 2009, Cisco ASA's Botnet Traffic Detector, Facebook malware focusing on Bank of America, Asymmetric threats in cyberspace, Botnet Communication Topologies, Visa, MasterCard In Security Hot Seat, Gumblar's 48,000 Compromised Domains, Under Cyberthreat: Defense Contractors, Cyberattacks: A call for collaborative action, Cybercime Riches Hard To Come By, 60 Minutes - The Internet is Infected, Maltego, Lessons from the Russia-Georgia Cyber-War, NSA Iraqi Computer Attacks And U.S. Defense