- Phase 1, New 1990s: mainly .mil
- Phase 2, 2000-2004: .gov additional to direct list
- Phase 3, 2005-2009: cleared accumulation contractors, investigate institutes, semipolitical and infrastructure additional to direct itemize (significant expansion)
- Phase 4, 2010- ? : treatment only restricted by resources?
Thursday, January 21, 2010
Is APT After You?
Wednesday, January 20, 2010
Review of Inside Cyber Warfare Posted
Illegal downloads at work put companies at risk, says FAST IiS
Tuesday, January 19, 2010
Bejtlich Teaching at Black Hat EU 2010
- Super early ends 1 Feb
- Early ends 1 Mar
- Regular ends 1 Apr
- Late ends 11 Apr
- Onsite starts at the conference
Rogue anti-virus prevalent on links that relate to Haiti earthquake, as donors encouraged to look carefully for genuine sites
Sunday, January 17, 2010
What Is APT and What Does It Want?
- Advanced effectuation the opponent crapper operate in the flooded spectrum of machine intrusion. They crapper ingest the most traveller publicly acquirable exploit against a well-known vulnerability, or they crapper elevate their mettlesome to investigate newborn vulnerabilities and amend custom exploits, depending on the target's posture.
- Persistent effectuation the opponent is formally tasked to fulfill a mission. They are not expedient intruders. Like an intelligence unit they obtain directives and impact to fulfill their masters. Persistent does not needs stingy they requirement to constantly fulfil vindictive cipher on individual computers. Rather, they reassert the take of interaction necessary to fulfil their objectives.
- Threat effectuation the opponent is not a piece of unreasonable code. This point is crucial. Some grouping throw around the term "threat" with meaning to malware. If malware had no human bespoken to it (someone to curb the victim, read the stolen data, etc.), then most malware would be of little worry (as daylong as it didn't mortify or contain data). Rather, the opponent here is a danger because it is organized and funded and motivated. Some grouping intercommunicate of multiple "groups" consisting of sacred "crews" with different missions.
- Political objectives that allow continuing to suppress its own population in the name of "stability."
- Economic objectives that rely on stealing highbrowed concept from victims. Such IP crapper be cloned and sold, studied and underbid in competitive dealings, or fused with topical investigate to display newborn products and services more chintzily than the victims.
- Technical objectives that boost their knowledge to fulfill their mission. These allow gaining admittance to maker cipher for boost exploit development, or acquisition how defenses impact in order to meliorate escape or disrupt them. Most worringly is the thought that intruders could attain changes to improve their function and lessen the victim.
Why Google v China is Different
Baidu Taken Down by DNS Hack
Saturday, January 16, 2010
Another Cross-over Point from WAN Optimization into the Proxy Space
Friday, January 15, 2010
Friday is Last Day to Register for Black Hat DC at Reduced Rate
- Regular ends 15 Jan
- Late ends 30 Jan
- Onsite starts at the conference
Malware, scareware appear in search results provided by Office.Microsoft.com
Thursday, January 14, 2010
Malware Threat Reports Fail to Add Up
Wednesday, January 13, 2010
Why Would APT Exploit Adobe?
Mechagodzilla v Godzilla
2010: Is it all hype?
Illegal downloads at work skyrocket
Monday, January 11, 2010
Facebook Beats Google on Xmas
Autorun virus - Microsoft patch KB971029
AutoRun is a Windows feature that allows files or programs to directly run as presently as a extractable media device, much as a USB follow or CD-ROM, is adjoining to a computer.AutoRun feature could earmark malicious cipher to spread. One of the vectors by which the communicable Conficker, or Downadup, insect propagates is finished pen drives / other extractable hardware medias
Microsoft has fixed a problem that prevents users from selectively unhealthful AutoRun features in an try to kibosh the Conficker insect from spreading.
Microsoft said it recommends every customers to establish the update, which affects every supported Windows versions.Read : Manually remove autorun.inf from your intend Download links The mass files are acquirable for download from the Microsoft Download Center:Update for Windows Server 2008 (KB971029) Windows6.0-KB971029-x86.msu Update for Windows Server 2008 for Itanium-based Systems (KB971029)Windows6.0-KB971029-ia64.msuUpdate for Windows Server 2008 x64 Edition (KB971029)Windows6.0-KB971029-x64.msuUpdate for Windows Vista (KB971029) Windows6.0-KB971029-x86.msuUpdate for Windows Vista for x64-based Systems (KB971029) Windows6.0-KB971029-x64.msu Update for Windows Server 2003 x64 Edition (KB971029)WindowsServer2003.WindowsXP-KB971029-x64-ENU.exeUpdate for Windows Server 2003 for Itanium-based Systems (KB971029)WindowsServer2003-KB971029-ia64-ENU.exe Update for Windows Server 2003 (KB971029) WindowsServer2003-KB971029-x86-ENU.exe Update for Windows XP (KB971029) WindowsXP-KB971029-x86-ENU.exe list of free online Anti virus scannersPrevent Virus infections finished extractable medias : KB971029Ref : http://support.microsoft.com/kb/971029
Friday, January 8, 2010
Happy 7th Birthday TaoSecurity Blog
Monday, January 4, 2010
Excerpts from Randy George's "Dark Side of DLP"
Friday, January 1, 2010
Best Book Bejtlich Read in 2009
- 5 stars: 6 books
- 4 stars: 5 books
- 3 stars: 4 books
- 2 stars: 0 books
- 1 stars: 0 books
- 6. Vi(1) Tips by Jacek Artymiak; devGuide.net. Every Unix admin should know how to ingest vi(1), and Jacek's aggregation provides the correct balance of commands and examples.
- 5. Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast by Paco Hope; O'Reilly. Even though I am not a Web developer, I institute this aggregation to be rattling country and adjuvant for security analysts trying to see Web traffic.
- 4. IPv6 Security by histrion Hogg; Cisco Press. When it comes to IPv6 security books, there is rattling no alternative, and thankfully this aggregation delivers.
- 3. Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan A. Carvey; Syngress. Harlan's update to the first edition of his aggregation is another winner; you staleness feature this book.
- 2. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Marcus Pinto; Wiley. This is an superior book. I feature individual books on Web covering security recently, and this is my favorite.
1. SQL Injection Attacks and Defense by Justin Clarke, et al; Syngress. This was a rattling tough call. Any of the crowning 4 books could easily hit been the best aggregation I feature in 2009. Congratulations to Syngress for publishing another winner. SQL injection is belike the sort digit problem for some server-side application, and this aggregation is unequaled in its coverage.Looking at the house count, crowning honors in 2009 go to Syngress for 2 titles, followed by Wiley, Cisco Press, O'Reilly, and devGuide.net, apiece with one. Thank you to every publishers who sent me books in 2009. I hit plentitude more to feature in 2010.Congratulations to every the authors who wrote great books in 2009, and who are publishing titles in 2010!Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)