<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7199877085229083327</atom:id><lastBuildDate>Thu, 26 Sep 2024 04:43:07 +0000</lastBuildDate><category>Security</category><category>Compromising Information</category><category>Hacked</category><category>Mitigating Risks</category><category>Other</category><category>Web-based Threats</category><category>Legal</category><category>Privacy</category><category>Tutorials</category><category>Hardware</category><category>Virus Updates</category><category>Announcements</category><category>Business Ventures</category><category>Media Players</category><category>Sans Ouch Newsletter</category><category>Upgrades</category><title>S.Y.S. (Secure your System)</title><description>A space for information security discussions from the world of Information Security Professionals to the novice computer end user</description><link>http://syssecurityblog.blogspot.com/</link><managingEditor>noreply@blogger.com (Mr. Smith)</managingEditor><generator>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-1556165777238442344</guid><pubDate>Wed, 10 Oct 2007 19:43:00 +0000</pubDate><atom:updated>2007-10-10T12:59:47.502-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Presidential candidates face phishing threat in &#39;08</title><description>Phishing is a huge threat, and has been in the past as well. Security professionals are worried that Presidential candidates in the 2008 may have problems with these attacks, and they could potentially disrupt their campaigns. Canidates websites are a very big target for these crimes to be deployed against. They can also make websites that seem to be legit campaign websites, and ask for contributions, getting donations to the campaign and credit card numbers of those who contribute. They also fear that they could use these methods to pose as one candidates website get donations that are suppossed to be for that canidate and give it to the opposing canidate they are in favor of. They can do this by making a site that it one letter off, from the real site domain name such as hilaryclin.com apposed to hilaryclint.com, and use typos to reek their havoc. Or they can use domains that appear to be an extent from the orginal such as hilaryclin.donate.com. These seem to be an extention of the real site, but are in fact a phishers&#39; websites. The 2008 candidates were warned about the risk that they may be targets but few have acted on these warnings. They need to know how much this can have an impact on their campaign and how they can fix it.</description><link>http://syssecurityblog.blogspot.com/2007/10/presidential-candidates-face-phishing.html</link><author>noreply@blogger.com (Nicolle Hebrank)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-2944135193250834797</guid><pubDate>Mon, 08 Oct 2007 23:46:00 +0000</pubDate><atom:updated>2007-10-09T18:39:13.935-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web-based Threats</category><title>Online Video Emerges as PC Security Hole</title><description>&lt;p class=&quot;MsoNormal&quot; style=&quot;text-indent: 0.5in; line-height: 200%;&quot;&gt;Hackers are always trying to find different avenues into your PC and it looks like they found a new way in which to worm themselves in: online videos.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Most computer users, by now, have been warned about (and infected by) malicious code sent to them via e-mail that hackers need to find an easier path to deliver their code.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Most people are unaware of the risks and dangers of viewing videos online (YouTube) and hackers are starting to take advantage of the situation.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;According to Chris Rouland, the chief technology officer for IBM Corp.&#39;s Internet Security Systems unit, &quot;As companies have gotten better blocking e-mails, we see people move to more creative techniques.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;The next logical step seems to be the media players.&quot;&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Malicious code isn’t just popping up in videos, but it is also being embedded in pictures and PDFs as well.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Just when you thought it was safe to view videos and pictures online, well, you thought wrong.&lt;br /&gt;http://www.msnbc.msn.com/id/21095733/&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-indent: 0.5in; line-height: 200%;&quot;&gt;  &lt;/p&gt;</description><link>http://syssecurityblog.blogspot.com/2007/10/online-video-emerges-as-pc-security.html</link><author>noreply@blogger.com (Kevin Cameron)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-1015676539955200958</guid><pubDate>Mon, 08 Oct 2007 16:38:00 +0000</pubDate><atom:updated>2007-10-09T04:36:32.673-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web-based Threats</category><title>Yahoo, eBay try to block phishing</title><description>Today’s emerging DomainKeys standard is taking a new form in hope to block phishing attacks. Yahoo is working with eBay and PayPal to help block fake emails that look to be from a legitimate user, but in reality are not. This new standard is going to help fight ongoing phishing attacks that have become more relevant in today’s computing world. EBay and PayPal have done upgrades to their systems to support this new DomainKeys standard. This procedure of authentication was developed by Yahoo and allows email senders to say who they are, allowing Yahoo to block emails that are imposing as someone else. DomainKeys is anti-spam application that uses a form of public key cryptography. This system will use the header of the message and use the DNS information and be compared to see if this was really coming from an actual user. The upgrade will be available to Yahoo mail users worldwide in the upcoming weeks. Other companies have been looking at ways to block phishing email but there have been multiple fears of blocking legitimate emails. Yahoo’s system is superior because it provides a way of automatically detecting the phished email without any consumer interaction. EBay and PayPal are the first to actively block unauthorized emails. This method is going to be emerging in the industry today because of the security it offers. Many consumers that are worried about the protection of the information they are getting from websites will be reassured when this new DomainKey standard is put into worldwide use.</description><link>http://syssecurityblog.blogspot.com/2007/10/yahoo-ebay-try-to-block-phishing.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-3952740592130895314</guid><pubDate>Fri, 05 Oct 2007 15:05:00 +0000</pubDate><atom:updated>2007-10-05T08:12:32.682-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacked</category><title>iPhone or Paperweight?</title><description>Apple said in a recent article that if you hacked into your iPhone to unlock it, you could end up with a $600 paperweight after they push out the new software updates later this week.  The updates will add features that will enable that iPhone to access the iTunes Wi-Fi music store.  Apple claims that once the software is installed the touch screen interface that controls that phone will not work properly or may become fully disabled.&lt;br /&gt;            Apple claims that their software updates have nothing to with causing the hacked iPhones to become disabled. Now come on!  If you believe that you’re pretty naive in my option; Apple knows exactly what they are doing.  This is a way for them to make peace with AT&amp;amp;T, since they were the only carrier to have the iPhone and put the screws to anyone who has hacked their own device.&lt;br /&gt;            I have to agree with John McLaughlin of Uniquephones.com, in Northern Ireland.  He said in the article that Apple is using this as a scare tactic to make people who hacked their iPhones think that they now own nothing more than a useless chunk of plastic.  McLaughlin goes on by saying that all that iPhones that have been hacked and unlocked can be put back into working order.  He also says that any changes done to the software of the iPhone to unlock it can easy be reversed and that minimal effort is needed to get the phone back into its original locked state.  However, Apple claims that as with any product that they offer, hacking the iPhone will void the factory warranty.&lt;br /&gt;&lt;br /&gt;To read the full article, go to: http://www.forbes.com/feeds/ap/2007/09/24/ap4151246.html</description><link>http://syssecurityblog.blogspot.com/2007/10/iphone-or-paperweight.html</link><author>noreply@blogger.com (Mike St.Clair)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-1895838065135138678</guid><pubDate>Thu, 04 Oct 2007 21:41:00 +0000</pubDate><atom:updated>2007-10-04T14:46:10.850-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Privacy</category><title>Big Brother is Watching</title><description>Today more and more people use their cell phones for email, the Internet, texting, as well as making phone calls. While this makes live easier for many, most people are unaware of the complications it can present as well. If you use of these functions offered by your phone, the phone company has records of it. Depending on the company you use, this means that the government also has these records. AT&amp;amp;T, Verizon and BellSouth have all given millions of users’ records to the NSA. The FBI has also abused the Foreign Intelligence Surveillance Act in order to secure records from these same companies. All of this was done without the customers’ consent or notification, often in direct violation of existing telecommunications privacy laws.&lt;br /&gt;&lt;br /&gt;Perhaps even scarier are the baby steps towards censorship that these same phone companies are taking. On Sept. 27, Verizon announced that it would block the text messages from a pro-abortion group. Although the decision was reversed fairly quickly in response to public outcry, both Verizon and AT&amp;amp;T released service agreements that state they have the right to suspend the service of anyone whose conduct is unacceptable.&lt;br /&gt;&lt;br /&gt;These statements make it clear that these companies are indeed monitoring their customers’ private communications, and are in fact passing judgment on them.&lt;br /&gt;Privacy used to be something that people could take for granted. Those days are over. National security is important, but so are civil liberties. Cell phones have opened up a whole new world, one that has the possibility, if people aren’t paying attention, of resembling an Orwell novel.&lt;br /&gt;&lt;br /&gt;http://www.eweek.com/article2/0,1895,2191479,00.asp&lt;br /&gt;http://www.eweek.com/article2/0,1895,2191092,00.asp</description><link>http://syssecurityblog.blogspot.com/2007/10/big-brother-is-watching.html</link><author>noreply@blogger.com (Vicki Klein)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-8749316248815530210</guid><pubDate>Tue, 02 Oct 2007 14:49:00 +0000</pubDate><atom:updated>2007-10-08T18:04:24.425-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mitigating Risks</category><title>Securing Mac</title><description>For as many computers as there are that run Windows as its OS, as an administrator you’re guaranteed to run across a few Mac OS X users. It is good to familiarize yourself with the security needs of the Macintosh OS. Mac&#39;s have a large selection of antivirus programs including Norton AntiVirus 10.0 For Macintosh, McAfee VirusScan For Mac, Intego Virus Barrier X4, Sophos Anti-Virus For Macintosh, and ClamXav. Because of the lesser popularity of the Mac OS spyware is a very small threat to the operating system. There are very few utilities that you can use to remove it. Two programs you can use though are SmithMicro Software&#39;s Internet Cleanup and SecureMac.com Inc.&#39;s MacScan. Many other ways of securing a Mac computer follow the same practices as a normal PC. Keep your OS up to date with the latest security updates. The software ran on the computers must be up to date as well. Setting up an IP Firewall is easy to do and can be done within the OS. A nice feature of the Mac OS is that it allows for 128-bit encryption using its FileVault feature. For the extremely paranoid Mac users, they would be happy to learn that they can even encrypt their virtual memory. Mac&#39;s out of the box are inherently more secure than PC&#39;s, but that does not mean that there aren&#39;t any threats out there. A Mac can be exploited or hacked just as easy as a Windows PC.</description><link>http://syssecurityblog.blogspot.com/2007/10/securing-mac.html</link><author>noreply@blogger.com (Doug Buck)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-5603929524081643631</guid><pubDate>Tue, 02 Oct 2007 12:27:00 +0000</pubDate><atom:updated>2007-10-02T05:30:18.540-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Upgrades</category><title>I&#39;m Riding This Thing Til the Wheels Fall Off...</title><description>After all is said and done, when we&#39;re finished with our &quot;Ooh&#39;s&quot; and &quot;Aaah&#39;s&quot; we all know that newer doesn&#39;t always mean better. The same concept comes with regards to Microsoft Vista -- some of our machines may not even have enough horsepower to merely power up the operating system to get to the login screen. Why deal with all of the hassles of upgrading your hardware to accommodate a measly piece of tras--software? Now you won&#39;t have to, at least for the next several years. Preston Gralla and Dave Methvin continue to explain that there are several tweaks and applications that any user can download to keep XP operating smoothly for quite some time (or hopefully long enough so that Vista can work out its kinks!). Their advice goes from attaining security improvements comparable to Vista&#39;s built-in features to tweaking XP&#39;s settings for faster performance. Take it from them, don&#39;t buy that shiny new toy.&lt;br /&gt;&lt;br /&gt;via &lt;a href=&quot;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9026940&amp;amp;pageNumber=1&quot;&gt;ComputerWorld&lt;/a&gt;</description><link>http://syssecurityblog.blogspot.com/2007/10/im-riding-this-thing-til-wheels-fall.html</link><author>noreply@blogger.com (Janey Annis)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-5706894462742314810</guid><pubDate>Tue, 02 Oct 2007 12:26:00 +0000</pubDate><atom:updated>2007-10-02T06:12:20.676-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Encryption faulted in TJX Hacking</title><description>For the past eight months, the Canadian government has been investigating an incident of millions of credit card numbers being stolen from two Marshalls department stores in Miami. The company that owns Marshalls, TJX Companies, is in trouble for several reasons. One reason is for the companys lack of upgrading encrypted software, which made this hack relatively easy.  Another reason is because the company had gathered too much personal information, and had kept it for too long. Some of the banks that the credit cards are used through have been notified of the hack and will be looking for fraudulent charges.</description><link>http://syssecurityblog.blogspot.com/2007/10/encryption-faulted-in-tjx-hacking.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-6576737368004394400</guid><pubDate>Tue, 02 Oct 2007 07:00:00 +0000</pubDate><atom:updated>2007-10-03T11:24:42.527-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Survey: Consumers Only Think They&#39;re Cyber Safe</title><description>In a survey taken by the National Cyber Security Alliance , many people said they think that there computer is safe against threats such as viruses or spyware, but truth is over half surveyed only thought that they were secure. 90% of the people surveyed store sensative information and do their banking, etc, online, which makes them even more vulnerable to falling in the wrong hands. The NSCA is a group of companies and government officials that educate people about computer security. In reality they were lacking an antivirus, antispware, or firewall. What does this mean? More than likely you aren&#39;t as safe as you think  you are. There&#39;s a good chance that your computer doesn&#39;t have the proper defenses in place or they aren&#39;t being updated properly. This month is National Cyber Security Awareness Month. The NCSA is urging people to take time and learn what you can do to protect your pc. Greg Garcia, assistant secretary for cybersecurity and communications at the U.S. Department of Homeland Security, says that we must both have security in the enterprises as well as on our personal machines. I advise all of you to learn as much as you can so, you can truely protect your systems.</description><link>http://syssecurityblog.blogspot.com/2007/10/survey-consumers-only-think-theyre.html</link><author>noreply@blogger.com (Nicolle Hebrank)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-8144738076973373922</guid><pubDate>Mon, 01 Oct 2007 14:07:00 +0000</pubDate><atom:updated>2007-10-08T18:06:10.243-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mitigating Risks</category><title>Securing Outlook Express</title><description>&lt;span style=&quot;;font-family:Arial;font-size:85%;&quot;  &gt;With  all of the virus&#39;s going around today that concentrate on exploiting  Outlook Express; users should be more aware of their actions while using  this software. There are many simple steps one can take to mitigate  the risk of infection. One solution would be to block applications from  sending e-mails. This will prevent an already infected computer from  spreading its worm. It will help when you are trying to track down the  source of the virus on your network. Another idea would be to turn off  HTML By turning off HTML you are preventing users from downloading pictures  that are contained in an e-mail. By simply downloading a picture a virus  can be released onto the users computer. Disabling JavaScript can prevent  information from being leaked on a network. Your browsing history and  cookies are all created using JavaScript. If this information is not  there then there is nothing to steal. Finally, by blocking malicious  attachments you can cut out a whole spectrum of problems. By implementing  some of these security measures you can stop some of those &quot;hardcore  end users&quot; (those co-workers that puzzle you as to how they turned  their computer on, let alone reveice and e-mail) from fubar&#39;ing up your  network.&lt;/span&gt;</description><link>http://syssecurityblog.blogspot.com/2007/10/securing-outlook-express.html</link><author>noreply@blogger.com (Doug Buck)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-6504682380887601210</guid><pubDate>Mon, 01 Oct 2007 14:01:00 +0000</pubDate><atom:updated>2007-10-08T18:06:54.159-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus Updates</category><title>Storm Worm Virus</title><description>&lt;p style=&quot;margin-bottom: 0in; line-height: 200%;&quot; align=&quot;left&quot;&gt;A group of European hackers calling themselves the Zhelatin gang have released a new virus across the world titled the “Storm Worm”. Computer analysts have estimated a total of 10 million computers that could already be infected. The Zhelatin were said to use every trick in the book on this one. They changed the code in several ways creating many different forms of the virus. Their means of spreading the virus was through e-mail spams, posts on blogs and forums, and also embedding links to their virus on youtube and other popular video streaming websites. With as many computers that were estimate to be infected, there are a lot of worries about if an attack such as this concentrated as a DDoS   attack; it would have crippled much of the web.&lt;/p&gt;</description><link>http://syssecurityblog.blogspot.com/2007/10/storm-worm-virus.html</link><author>noreply@blogger.com (Doug Buck)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-7873668573815811670</guid><pubDate>Mon, 01 Oct 2007 13:58:00 +0000</pubDate><atom:updated>2007-10-08T18:07:47.464-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Other</category><title>Network Access Protection</title><description>&lt;p style=&quot;margin-bottom: 0in; line-height: 200%;&quot; align=&quot;left&quot;&gt; One of the new security features of Windows vista Includes Network Access Protection (NAP). This service will prevent unsecured computers from connecting to your network. When a computer is introduced to the network it will have to meet certain requirements in order to connect with the other computers on the network All computers will have to have the latest security updates with up to date anti-virus software. When accessing a network the server will audit a computer, asking it for all information about its anti-virus and security information. Essentially Microsoft took its Baseline Security Anyliser and implemented it as a network security solution.&lt;/p&gt;</description><link>http://syssecurityblog.blogspot.com/2007/10/network-access-protection.html</link><author>noreply@blogger.com (Doug Buck)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-3457520399662147015</guid><pubDate>Mon, 01 Oct 2007 13:51:00 +0000</pubDate><atom:updated>2007-10-08T18:08:41.134-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacked</category><title>AOL has hole in IM software</title><description>Everyone today seems to use AIM instant messenger. How would you like the possibility of your computer being hacked into by going through your messaging system? Recently there was a study done that showed a security hole in the widely used new AIM programs. The holes were seen in versions 6.1 and 6.2 which is still in the beta test mode. Core Security Technologies were the ones that stumbled upon the flaw and notified Time Warner Inc. in late August of this year. AOL has said the problem was fixed but now they are saying that solution was temporary because of the more holes they have discovered. Core Security says the hole emerged because of the way the new versions allow for more various fonts and they can sent picture expressions in their chats. Hackers can release a certain command in an IM session and then the intruder would have access to their computer. As of right now AOL spokespeople say that AIM users should consider themselves “completely safe”, but in today’s computer would nothing is ever “completely safe” rather just less insecure. They are currently taking action against the hacks by putting more testing into play on how these hacks are being executed. The best advice right now if you are an AIM junkie would be to switch to the older version of 5.9 or use the web based aim until the bugs are fully resolved. Also just be aware if anything looks suspicious not to click on it.</description><link>http://syssecurityblog.blogspot.com/2007/10/aol-has-hole-in-im-software.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-7197871902841087044</guid><pubDate>Sat, 29 Sep 2007 20:56:00 +0000</pubDate><atom:updated>2007-09-29T14:00:35.341-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Compromising Information</category><category domain="http://www.blogger.com/atom/ns#">Mitigating Risks</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Web-based Threats</category><title>&quot;Death and Taxes&quot;</title><description>&lt;div&gt;As every Security Professional knows, phishing is a problem. Let&#39;s first take a step back. Phishing is the act of sending an email or placing a phone where the attacker pretends to be a legitimate company to get your information. You generally see emails like &quot;Your Ebay account has been disabled. Click here and enter your account info to reactivate&quot;.When you click on it, it takes you to the attacker&#39;s site and he/she has your account info. &lt;/div&gt; &lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt; &lt;div&gt;Well, those dirty attackers are at it again. This time they are posing as the IRS. here is a sample of an email you may receive:&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.irs.gov/irs/cda/common/images/irslogo.gif&quot; /&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;;font-family:Tahoma;font-size:85%;&quot;  &gt;After the last annual calculations of your fiscal activity we have determined that&lt;br /&gt;you are eligible to receive a tax refund of &lt;b&gt;$268.32&lt;/b&gt;.&lt;br /&gt;Please submit the tax refund request and allow us 3-6 days in order to&lt;br /&gt;process it.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;A refund can be delayed for a variety of reasons.&lt;br /&gt;For example submitting invalid records or applying after the deadline.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;To access the form for your tax refund, please &lt;u&gt;&lt;span style=&quot;color: rgb(0, 153, 255);&quot;&gt;click here&lt;/span&gt;&lt;/u&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;color: rgb(255, 0, 0);font-family:Tahoma;font-size:85%;&quot;  &gt;&lt;b&gt;Note:&lt;/b&gt; For security reasons, we will record your ip-address, the date and time.&lt;br /&gt;Deliberate wrong inputs are criminally pursued and indicated.  &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;;font-family:Tahoma;font-size:85%;&quot;  &gt;Regards,&lt;br /&gt;Internal Revenue Service &lt;/span&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;© Copyright 2007, Internal Revenue Service U.S.A. All rights reserved.&lt;br /&gt;&lt;/p&gt;________________________________________________&lt;br /&gt;&lt;p&gt;Turns out, when you click on that link. It takes you to a Russian site. Last time i checked the IRS didn&#39;t have a Russian Branch.&lt;/p&gt; &lt;p&gt;Click &lt;a href=&quot;http://www.adeltarealty.net/blog/real-estate-news/irs/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;here&lt;/a&gt; for the article.&lt;/p&gt;&lt;/div&gt;</description><link>http://syssecurityblog.blogspot.com/2007/09/death-and-taxes.html</link><author>noreply@blogger.com (Chris Deem)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-6748046676714161371</guid><pubDate>Wed, 26 Sep 2007 16:36:00 +0000</pubDate><atom:updated>2007-10-08T18:09:09.607-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Legal</category><title>New York subpoenas Facebook over user safety</title><description>State&#39;s attorney general says Facebook ignored complaints about sexual predators&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;     How many of you know someone that is underage and use Facebook? I bet, over half of you do. It is one of the biggest growing online social networks. It is met to be for college students, but there are many users that are young and vulnerable to sexual predators. Facebook has apparently done nothing to make sure that children and young teens are not solicited by pediphiles. It also, contains many graphic pornographic images and videos readily at anyone who uses the network&#39;s disposal.&lt;br /&gt;      The attorney general of New York (Andrew Cuomo) and other law enforcement officials have been conducting investigations on these claims. They posed as children from ages 12 to 14 and made accounts. During their investigation they found that Facebook did not have any type of indentifying information to set up these accounts. They also were solicited by a number of adults thinking they were children. They found tons of pornographic images and videos that anyone could view, that had an account. Nobody has been able to get any comments from Facebook.&lt;br /&gt;      When they tried to contact Facebook posing as children that had been solicited by online predators and the parents of the children they recieve little response. When they did respond they took very long to do so. Once, they responded they took some of the images off the site, but did nothing about various pornography that was being hosted by users of the site or children being solicited by pedophiles.&lt;br /&gt;       Andrew Cuomo has issued a subpoena requiring Facebook to turn in all complaints that have been made about the material and solicitation of children. They also must now respond to these issues as well by law. Those of you who have children can image how important it is to take action against this issue. They could be the ones that are actually being solicited by sexual predators on Facebook, or looking at the junk the users put up there. And, if your a legitamate Facebook user that is of age, you will probably see more restrictions on what you can post and what is allowed to be in your profile. You may also have to provide credentials verifying your identity. Like in many cases there are going to be restrictions set, because people are not being responsible and abusing the site.</description><link>http://syssecurityblog.blogspot.com/2007/09/new-york-subpoenas-facebook-over-user.html</link><author>noreply@blogger.com (Nicolle Hebrank)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-2997798995663542734</guid><pubDate>Wed, 26 Sep 2007 14:53:00 +0000</pubDate><atom:updated>2007-09-26T07:55:19.075-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Mortgage data leaked over file network</title><description>A disgruntled employee strikes again... A former employee of ABN Amro&lt;br /&gt;Mortgage Group put up a spreadsheet with more than 5,000 Social&lt;br /&gt;Security Numbers on the file sharing network &#39;BearShare&#39;. A Pittsburgh&lt;br /&gt;based company called Tiversa Inc., discovered that the path came from&lt;br /&gt;an ABN Florida computer that had ShareBear installed on it. It was&lt;br /&gt;then discovered to be traced from the employees home computer. It is&lt;br /&gt;now believed that identity theives have these SSN numbers and plan to&lt;br /&gt;use them in their favor. ABN says that it plans to further investigate&lt;br /&gt;the issue.</description><link>http://syssecurityblog.blogspot.com/2007/09/mortgage-data-leaked-over-file-network.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-6671526942603296195</guid><pubDate>Tue, 25 Sep 2007 11:23:00 +0000</pubDate><atom:updated>2007-10-08T18:08:56.429-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacked</category><title>Future Mobile Phone Attacks Inevitable</title><description>Within the new technology rising in mobile phones, so is the possibility for an attack. According to researchers at McAfee, mobile malware attacks are not yet popular. The key word there was “yet”. The mobile phone industry really has hit a large boom in terms of smartphones. The phones most consumers and businessmen are using today are not the old-fashioned flip phone, but a device which can do more than just make telephone calls. Currently today Microsoft has a mobile platform called Windows Mobile. They just currently released a new version called Windows Mobile 6. Apple’s IPhone is a similar device offering web browsing, word document editing, and customers to purchase items through their phone. Researchers predict within the next few years the attacks will become large on mobile phones. Many of the phones right now have Wi-Fi built into them for fast internet browsing. This poses a threat in the same way a regular computer would be connected to the internet. Even though it is a mobile phone it is connecting to servers and getting information from another source. Right now this source is trusted, but cybercriminals are beginning to work on ways to hack important information from the mobile phone. Text messages, phone books, important spreadsheets are all types of information that could be intercepted and stolen. A good rule of thumb would be to know the websites you are visiting through the mobile web browser. This will allow the average user’s phone to remain safe, and always remember never give out important information to an unauthorized source.</description><link>http://syssecurityblog.blogspot.com/2007/09/future-mobile-phone-attacks-inevitable.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-6310226015175599161</guid><pubDate>Tue, 25 Sep 2007 00:22:00 +0000</pubDate><atom:updated>2007-09-24T17:24:42.602-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Compromising Information</category><category domain="http://www.blogger.com/atom/ns#">Hacked</category><title>Cough Up the Dough or Your Email Gets It</title><description>Jesse Sklar found himself in a predicament when he noticed that not only was he locked out of his hotmail account, but there was also someone holding it for ransom at one hundred dollars. While Sklar states that he no longer uses the email account on a regular basis, it contains many passwords and other crucial information dealing with his finances.&lt;br /&gt;&lt;br /&gt;When it came to his account on &lt;a href=&quot;http://ticketmaster.com/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;Ticketmaster.com&lt;/a&gt; or &lt;a href=&quot;http://amazon.com/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;Amazon.com&lt;/a&gt; and the like, Sklar soon came to realize that the credentials for these accounts and various others could be compromised and decided to change them immediately. While he implemented the security measures that hotmail has all users place, such as a security question and a backup email -- this was useless for Sklar due to having signed up for the hotmail service decades ago, as he recalls. All he really wants is for the email to be shutdown. Upon later inspection, the kidnapper asked Sklar to send the information via &quot;&lt;a href=&quot;http://paypalll.tk/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;Paypalll.tk&lt;/a&gt;&quot; which is some sort of phishing scam that may result in Sklar losing more than one hundred dollars had he decided to give the money.&lt;br /&gt;&lt;br /&gt;If there&#39;s anything to take out of Sklar&#39;s story, it is not to make the same passwords for everything, as well as not storing crucial information in your emails -- especially one that is a free service.&lt;br /&gt;&lt;br /&gt;via &lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2007/09/your_money_or_your_email.html&quot;&gt;WashingtonPost.com&lt;/a&gt;</description><link>http://syssecurityblog.blogspot.com/2007/09/cough-up-dough-or-your-email-gets-it.html</link><author>noreply@blogger.com (Janey Annis)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-4383731007269611114</guid><pubDate>Thu, 20 Sep 2007 22:37:00 +0000</pubDate><atom:updated>2007-09-20T15:38:36.489-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Do not be a Victim of Social Engineering</title><description>In the past few months, not only was Monster.com attacked but also was Ameritrade. In both situations most of the information that was reported stolen by these companies were names and email addresses, not extremely confidential information but, a starting place for scammers out there that would love to steal your identity. In the case of Ameritrade, they found out their database has been breached by a few of their customers because they had received junk mail they felt was unusual to be receiving and reported it to the company. Once Ameritrade investigated it, they determined there was a breach in to their database exposing information about 6.3 million clients.&lt;br /&gt; It is very important now for customers to be aware of the type of emails they get from Ameritrade and do not give out any additional information about themselves in these emails. In most cases, the cyber thieves will be trying to send phishing emails that look very real and will be trying to get the recipients of these emails to provide personal information to be used to try to steal their identity for the thieves’ individual use or to sell to others and make money. Ameritrade should be advising their clients never to give out personal information via emails but if they have not advised their clientele of these standards the client themselves needs to be very careful and call Ameritrade directly if they feel something is not right. Social engineering is very difficult to stop and anybody is capable of social engineer because it does not require technical knowledge so as the consumer you must be aware and careful to protect yourself against a social engineering attack.</description><link>http://syssecurityblog.blogspot.com/2007/09/do-not-be-victim-of-social-engineering.html</link><author>noreply@blogger.com (Cyndee Hardy)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-4001969026136627191</guid><pubDate>Thu, 20 Sep 2007 03:13:00 +0000</pubDate><atom:updated>2007-09-19T20:18:13.527-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>New Zero-Day Hole in Windows XP</title><description>Brand new “zero-day” vulnerability has been discovered in XP.  It hasn&#39;t been made official yet but a hole was discovered by Jonathan Sarba of GoodFellas Security Research Team.  The hole is vulnerable to a buffer overflow attack that exploits an HP All-in-One Series Web Release software/driver installer (version 2.1.0) and an        HP Photo &amp;amp; Imaging Gallery (version 1.1) program.  The flaw is considered fairly critical because, when exploited, it could lead to a complete compromise of a PC.  Microsoft was made aware of the hole back in June but is still investigating it further, so no patch or workaround has been released as of yet.  If you are running either of these pieces of software on your PC or on your network, please be aware of any unusual activity and maybe stay away from using those versions of the HP drivers and programs.&lt;br /&gt;                For more information, check out the original article by clicking this hyper link &lt;span style=&quot;font-size: 12pt; font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;a href=&quot;http://blogs.pcworld.com/staffblog/archives/005477.html&quot;&gt;http://blogs.pcworld.com/staffblog/archives/005477.html&lt;/a&gt;&lt;/span&gt;</description><link>http://syssecurityblog.blogspot.com/2007/09/new-zero-day-hole-in-windows-xp.html</link><author>noreply@blogger.com (Kevin Cameron)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-7889993298663405070</guid><pubDate>Thu, 20 Sep 2007 03:04:00 +0000</pubDate><atom:updated>2007-09-19T20:12:37.556-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Privacy</category><title>The Assault on Privacy by Technology in Modern Times</title><description>The controversial issue of privacy is coming to the forefront more and more often in our modern civilization.  As technology evolves, so does the need for redefining how privacy is handled by big business, government agencies, and individuals themselves.  In this information and technology driven society, keeping your personal information private is more important than ever.  Currently, personal information is being bought, sold, exchanged, and stolen in a public environment (at an alarming rate) with both good and bad intentions via the Internet.  In the book &lt;span style=&quot;font-style: italic;&quot;&gt;Database Nation&lt;/span&gt;, Simson Garfinkel (who writes a monthly column for &lt;span style=&quot;font-style: italic;&quot;&gt;CSO Magazine&lt;/span&gt; and has a multitude of computer science degrees from MIT) discusses how the main issue of privacy involves the civil rights of people to be in charge of their own information about their life and to develop a system that protects that right of privacy.  Garfinkel also agrees that without privacy protection, this country could slip into an “Orwellian” state of mind, whereas nothing about our lives will be private, not even our thoughts.&lt;br /&gt;        Conversely, that same right to privacy, that we enjoy so much, could also leave us vulnerable to terrorism by protecting terrorists’ rights of privacy.  This would hinder or prevent our local and federal law enforcement agencies’ ability to investigate people who may be planning terrorism activities.  Advocates on this side of the coin might say “Maybe if there was less privacy among citizens of the United States, then disasters such as 9/11 might not have ever happened?”  This might be true, but for every one successful terrorist attack that slips through the cracks; there are hundreds of others that were foiled before they could carry out their plan.&lt;br /&gt;        As it stands, technology is one of the primary factors involved in the invasion of privacy.  One of the most popular ways of invading someone’s privacy, using this technology, is to track their Internet surfing habits.  This can tell you all that you need to know about that person.  Just imagine if you are out on Saturday afternoon and you had to run some errands or do some shopping and you had someone following you around everywhere.  They would have a pretty good idea of what type of buying habits and interests you might have.  Then, they would collect this information and sell it to the highest bidder.  This is where we’re heading to if we don’t nip this situation it in the bud, so to speak.&lt;br /&gt;        This same technology that can invade our privacy can also help to protect it.  When your computer is filled with spy-ware, viruses, and Trojans, it’s almost as if you’ve been cyber-mugged.  It’s no different than being mugged on the street.  The thief can get away with your money, identity, and your privacy without ever having to leave their house.  If you clean your computer’s cache on a daily basis, run an internal/external firewall, and have an up-to-date anti-virus and anti-spyware programs running at all times, you can avoid being tracked and mugged online.  Now, the tables have turned as you can use some of the very same type of tools that were used to attack you can now be used to conceal and protect your privacy.&lt;br /&gt;        If we change one of our fundamental civil rights, then we are letting the terrorists know that they are succeeding.  Their realization of this success may increase the volume and number of terrorists’ attacks.  If we don’t do something about the protection of our privacy on the Internet; big business, smalltime hackers, and the government will enjoy an unregulated free-for-all with all of the private information that they are able to collect on us.  If we choose to continue down this path, eventually we will get to a point where privacy will be a thing of the past and all of our hopes, dreams, and aspirations will be for sale to the highest bidder.  So, Big Brother, how much private information would you like to buy today?</description><link>http://syssecurityblog.blogspot.com/2007/09/assault-on-privacy-by-technology-in.html</link><author>noreply@blogger.com (Kevin Cameron)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-4436877022725919633</guid><pubDate>Thu, 20 Sep 2007 02:55:00 +0000</pubDate><atom:updated>2007-09-19T20:03:59.216-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Legal</category><title>Judge Rules Against Parts of the Patriot Act</title><description>&lt;p class=&quot;MsoNormal&quot; style=&quot;text-indent: 0.5in; line-height: 200%;&quot;&gt;&lt;/p&gt;        The government’s second attempt to rewrite the U.S. Constitution has failed.  U.S. District Judge Victor Marrero has ruled against the rewritten USA Patriot Act, saying that it &quot;offends the fundamental constitutional principles of checks and balances and separation of powers.&quot;  The main area of concern is that the FBI is allowed to demand private customer records from businesses, without a court order, which is required for searches done by the United States government.  This completely bypasses the judiciary branch of the government and is absolutely unconstitutional.   &lt;br /&gt;        In an investigative situation, the government can order NSLs or national security letters which is an investigative tool that is used by the FBI to get businesses to turn over private customer information.  The most controversial and sought after private customer information would be that of Internet service providers, telephone companies, and public libraries.  Not only will the businesses have to turnover the private information but they would have “the right to remain silent” about informing their customers that it was turning over records to the government.  The FBI is arguing that phone or Internet records are &quot;relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities.&quot;  That might be so but that is not a good enough reason to change the very values that this country was founded upon.  Has anybody in the Executive Branch of the government even read the Constitution?  Apparently they have not.&lt;br /&gt;        For more information, check out the original article by clicking this hyper link &lt;a href=&quot;http://www.msnbc.msn.com/id/20624404/wid/11915829&quot;&gt;http://www.msnbc.msn.com/id/20624404/wid/11915829&lt;/a&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-indent: 0.5in; line-height: 200%;&quot;&gt;&lt;/p&gt;</description><link>http://syssecurityblog.blogspot.com/2007/09/judge-rules-against-parts-of-patriot.html</link><author>noreply@blogger.com (Kevin Cameron)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-89788254595805179</guid><pubDate>Wed, 19 Sep 2007 22:22:00 +0000</pubDate><atom:updated>2007-09-19T15:23:58.563-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Online crooks getting more professional</title><description>Computer criminals are making money be selling pre-made software to&lt;br /&gt;other computer criminals. Symantic Corp. has reported that middlemen&lt;br /&gt;are buying malicious software and spam in order to distribute it to&lt;br /&gt;consumers in hopes, in some cases, to steal identities, and important&lt;br /&gt;information. There programmers are getting contracts with the&lt;br /&gt;middlemen in order to frequently distribute the software as soon as a&lt;br /&gt;new program is created. On a lighter note, Symantic says that because&lt;br /&gt;of the contracts, it may be easier to track the path from the&lt;br /&gt;distributer,and perhaps even the creators of the software.</description><link>http://syssecurityblog.blogspot.com/2007/09/online-crooks-getting-more-professional.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-8604617539490153868</guid><pubDate>Wed, 19 Sep 2007 03:56:00 +0000</pubDate><atom:updated>2007-09-18T21:00:09.995-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Privacy</category><title>Google to call for web privacy shake-up</title><description>Millions of people use Google, everyday to conduct searches for websites, news, images, maps, and just about anything else you can find on the web. In the past they have had a bad reputation in the privacy area. What does this have to do with you? In the past it has been pointed out that they weren&#39;t keeping our (the average users) personal information too private. Well, they are now taking steps to ensure that our information doesn&#39;t fall into the wrong hands. &lt;br /&gt;        Friday, Google plans to propose that there be new international privacy laws made. This would help keep your personal information from the eyes of others.  Google&#39;s global privacy counsel (Peter Fleischer), says that the OECD or some other international body, should develop new international privacy guidelines. The Organisation for Economic Co-Operation and Development is a international organisation that deals with issues having to do with economic growth. &lt;br /&gt;          Google is trying to restore the image they have had due to past criticism. Since, the European Union data protection bodies pointed out that Google stored your personal information for way to long. They were also criticised by Privacy International as being really bad in the department of keeping personal information, personal. Google also has made changes to the length of time they store personal information to 18 monthes. They are also working with Privacy International to regain face.&lt;br /&gt;         Fleischer is going to protest that the Internet privacy rules are out of date and need to be replaced with new ones. There hasn&#39;t been changes in it since 1995 which is 7 years ago so much innovation has happened since then. He is going to suggest that they use privacy rules Asian ministers established the Asia-Pacific Economic Co-operation conference in 2004  Of course these international rules would be more unspecific and would allow each nation to decide how to enforce them.&lt;br /&gt;         I don&#39;t know about you but if this plan is implemented and they update the privacy laws, I will feel a little more ease when using the Internet, with my personal information. This is one step in the battle of keeping you the customer safe from crimes such as identity theft, and other attacks on your information. Every time you go on the web at least some of your information is sent out to the world, what&#39;s to keep it from falling into the wrong hands? This is definitely a positive development for web users, no matter who you are.</description><link>http://syssecurityblog.blogspot.com/2007/09/google-to-call-for-web-privacy-shake-up.html</link><author>noreply@blogger.com (Nicolle Hebrank)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7199877085229083327.post-3810277298130425746</guid><pubDate>Wed, 19 Sep 2007 02:24:00 +0000</pubDate><atom:updated>2007-09-18T19:30:09.630-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Other</category><title>You&#39;re Right, Your Computer Does Have a Mind of its Own</title><description>&lt;div&gt;&quot;Over the last few weeks, without user approval, Windows Update has updated nine small executable files in both Windows XP and Windows Vista&quot;&lt;/div&gt; &lt;div&gt; &lt;/div&gt; &lt;div&gt;&lt;br /&gt;Sure, I guess you could say this might be fine seeing as the updates are coming from a trusted site, and while it may be a little sketchy to update your computer without your consent it was for a good reason, right?  Maybe so, but imagine if Microsoft&#39;s Windows Update feature was compromised by an a person of ill-intent. &lt;/div&gt; &lt;div&gt; &lt;/div&gt; &lt;div&gt;&lt;br /&gt;The updates in question turned out to be critical updates for Windows Update to function properly, but this still left customers confused as to not having prior knowledge or ability to consent with their releases.&lt;/div&gt;  &lt;div&gt; &lt;/div&gt;  &lt;div&gt; &lt;/div&gt; &lt;div&gt;&lt;br /&gt;For an operating system that throws in a couple of mundane text bubbles and alerts for even the slightest event, this sure is un-Microsoft-like.&lt;br /&gt;&lt;br /&gt;via &lt;a href=&quot;http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263&quot;&gt;InformationWeek&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://syssecurityblog.blogspot.com/2007/09/youre-right-your-computer-does-have.html</link><author>noreply@blogger.com (Janey Annis)</author><thr:total>0</thr:total></item></channel></rss>