Security, Malware, and Phishing

[ home | Arts | Editorials | Evil | Humour | Jobs | Library | Life | Lists | Michigan | Networking | News | Resources | Resume | Security | Stories | Survival Guide | Wireless | Back to top | Table of Contents | contact | disclaimer ]

[ Sites | Papers ]

Sites

 

Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. In its seven years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news.

 

Internet safety education. Founded in 1998 and endorsed by the U.S. Congress
This group testified before the US House Energy and Commerce Subcommitte on Oversight and Investigations hearings on April 4, 2006

I-Safe  
Insecure.Org Kaspersky Labs

By Fyodo, who runs several Internet security resource sites, Insecure.Org, SecLists.Org, and SecTools.Org. He also wrote and maintains the Nmap Security Scanner.

Kaspersky Labs
National Center for Missing and Exploited Children

The National Center for Missing and Exploited Children, www.ncmec.org
This group testified before the US House Energy and Commerce Subcommitte on Oversight and Investigations hearings on April 4, 2006

Help Net Security Help Net Security
The Register

The Register's Security section

securityfocus.com is a good first choice on what's going on with malware, etc.

SecurityFocus.com
Spyware Warrior

Fighting spyware and adware.

The University of Michigan's Information Technology Security Services website.

The University of Michigan ITSS Security Services
Uribe100.Com

The Uribe 100 top 100 security site.

The University of Michigan's Virus-Busters web site, virusbusters.itcs.umich.edu/.

World Famous Virus-Busters!

viruslist.com
All about internet security

wiredsafety.org is the world's largest online safety and help group
This group testified before the US House Energy and Commerce Subcommitte on Oversight and Investigations hearings on April 4, 2006

Wired Safety.Org
Bind Shell.NET

Security issues, tools, papers, advisories.

Treachery.Net

treachery.net
philosecurity.org

Philosecurity is written by Sherri Davidoff.

Sherri Davidoff is an independent security consultant based in Missoula, MT. She specializes in penetration testing, forensics, vulnerability assessments and incident response. She holds a bachelor's degree in Computer Science and Electrical Engineering from MIT.

When she's not busy with information security, Sherri pitches in with Buy It Like You Mean It, a Cambridge nonprofit dedicated to enabling socially responsible purchasing.

The Kaspersky Lab Security News Service ThreatPost.com


Papers and Reports

[ home | Arts | Editorials | Evil | Humour | Jobs | Library | Life | Lists | Michigan | Networking | News | Resources | Resume | Security | Stories | Survival Guide | Wireless | Back to top | Table of Contents | contact | disclaimer ]

[ Sites | Papers ]

RFID (Radio Frequency Identification)

RFID is a convenient way to tag items, products, people - and for hackers et. al. to game the system.

SSL, Certificates, Certficate Authorities (CAs)

Collected information about SSL (Secure Socket Layer), TLS (Transport Layer Security), Certificates, Certicate Authorities (CAs), OpenSSL, OpenSSH, HTTPS, etc.

VOIP - INVITE of Death

An attack on VOIP systems which can be done via. UDP.

Google Browser Security Handbook

This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities.

Although all browsers implement roughly the same set of baseline features, there is relatively little standardization - or conformance to standards - when it comes to many of the less apparent implementation details. Furthermore, vendors routinely introduce proprietary tweaks or improvements that may interfere with existing features in non-obvious ways, and seldom provide a detailed discussion of potential problems.

Browser Cookies — Cookies, etc.
Sexual Exploitation of Children Over the Internet: What Parents, Kids and Congress Need to Know About Child Predators
The House Energy and Commerce subcommitte on Oversight and Investigations hearings: Sexual Exploitation of Children Over the Internet: What Parents, Kids and Congress Need to Know About Child Predators, April 4, 2006.

See also the articles by Kurt Eichenwald of the New York Times.


NY Times — Child Pornography

A series of articles in the New York Times on child pornography, in particular the use of computers and credit card processors in the support of a large network of child pornographers and molesters.

viruslist.com Malware Evolution: 2005, part two

Part 2 of a series of articles about Malware in 2005.

viruslist.com Malware Evolution: 2005

Part 1 of a series of articles about Malware in 2005.

Lessons from the Beagle Virus, to 4/24/2004

Lessons from the Beagle Virus

Lessons from the Beagle Virus, 4/24/2004 to 8/31/2004

Lessons from the Beagle Virus

Blanket Discovery for Stolen Laptops

Security Focus March 12, 2007 by Mark Rasch.

Washington Post March 14, 2007 — Cyber-Criminals and Their Tools Getting Bolder, More Sophisticated

(local copy)

Washington Post Security Fix Blog, March 14 2007, Tracking the Password Thieves

IPv6 Protocol Type 0 Route Header Denial of Service Vulnerability

SecurityFocus Apr 23 2007 12:00AM IPv6 Protocol Type 0 Route Header Denial of Service Vulnerability
See also:

Physical Security Maxims

Vulnerability Assessment Team (VAT)
Seals
Physical Security Maxims

(local PDF copy)

Printer Security Codes

Yellow Dots of Mystery: Is Your Printer Spying on You?
See also:


[ home | Arts | Editorials | Evil | Humour | Jobs | Library | Life | Lists | Michigan | Networking | News | Resources | Resume | Security | Stories | Survival Guide | Wireless | Back to top | Table of Contents | contact | disclaimer ]