Archive | June, 2006


11 June 2006 | 3,352 views

Custom Trojans – Isn’t it Old News?

Well it is for me, and I guess anyone who consider themselves a career hacker, or at least has a serious interest.. As a few good trojans are open source (Back Orifice?), you can just mess around with them for a while until you reach the point they are no longer detected by any of [...]

Continue Reading


10 June 2006 | 3,571 views

Predicting Malware – Events Trigger Malware/Phishing Spikes

Apologies for the lack of updates for the past few days, I had to go abroad for an important assessment ;) It’s sad how people can pray on things as terrible as disasters to make a quick buck, but well we have to face the facts that they do, and will. And as it seems, [...]

Continue Reading


07 June 2006 | 10,762 views

Graph Analysis of Credit Card Loss

I saw some interesting information recently on a mailing list. We took one sample of one carding/phishing forum that our Global Surveillance Center was monitoring and sampled the set into a graph that lists the top 10 banks and the losses over the last month. As you can see, it’s obvious who the top credit [...]

Continue Reading


06 June 2006 | 7,602 views

RFID & Biometrics Used At World Cup in Germany

RFID, biometrics, hi-tech police officers, yes it’s all going to be happening in Germany for the close approaching World Cup 2006. Not surprisingly, security is a top priority for the German government, even higher than its desire to see the national team walk off the pitch with the World Cup 2006 trophy. The list of [...]

Continue Reading


05 June 2006 | 51,961 views

The Top 10 Most Common Passwords

A pretty interesting article that statistically measured the frequency of passwords by taking an aggregate sample of passwords (primarily from the UK). Here are listed the most commonly occurring from the sample. 10. ‘thomas’ (0.99%) First off, at number 10, is the most common format of passwords – the name. Thomas is a perennially popular [...]

Continue Reading


03 June 2006 | 5,814 views

The MPAA TorrentSpy Hacker – $15,000!

Ah the big boys can’t get in legitimately, so they are starting to use underhand tactics eh? A lawsuit filed Wednesday accuses the Motion Picture Association of America of hiring a hacker to steal information from a company that the MPAA has accused of helping copyright violators. The lawsuit (click for PDF), filed in U.S. [...]

Continue Reading


02 June 2006 | 10,901 views

THC Releases Nokia Phone ROM Images

I have to agree with their sentiment, I’m all for open hardware standards. Even if you don’t open it, people will copy it anyway (See the mass of Cisco knock-offs in China for a fraction of the price with almost exactly the same functions and IOS) So why not open it, let us play with [...]

Continue Reading


02 June 2006 | 4,856 views

New Spyware Blackmails Users Into Purchasing Software

Ah this is almost like Ransomeware again, messing up your machine then extorting money from you. Make sure you educate your non tech savvy relatives about such threats, spyware, adware, trojans and worm type viruses. Education is THE most powerful defence against malware and computer security incidents. Some simple patching, a free Antivirus protection like [...]

Continue Reading


01 June 2006 | 5,304 views

SyScan’06 – The Asian Hackers’ Conference

The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan’06 intends to be a non-product, non-vendor biased security conference. It is the aspiration of SyScan’06 to [...]

Continue Reading


01 June 2006 | 3,887 views

My SQL2005 Diary – Part 2

So over a month down the line, our SQL2005 upgrade project should now be in the workable prototype stage. But as with all things that “should” be(More security in IE, Great Britain ruling the world and my kitchen being fitted), it’s not, it’s not even close. On top of this our company is currently undergoing [...]

Continue Reading