29 January 2009 
                     
                    Guides, Papers, etc 
                    www.thestandard.com 
                    The 7 dirty secrets of the security industry. 
                    Read more
                    
                    abcnews.go.com 
                    Teacher: Wrong Computer Click Ruined My Life. 
                    Read more  www.theregister.co.uk 
                    Extreme porn law goes live - are you ready? 
                    Read more
                     www.benedelman.org 
                    False and Deceptive Display Ads at Yahoo's Right Media. 
                    Read more  www.joelesler.net 
                    Skype, is it right for you? 
                    Read more
                     holisticinfosec.blogspot.com 
                    Online finance flaw: one flaw to rule them all. 
                    Read more
                     googleblog.blogspot.com 
                    Introducing Measurement Lab. 
                    Read more
                     www.f-secure.com 
                    Is it Time for Internetpol? 
                    Read more 
                    
                     www.f-secure.com 
                    Where is Downadup? Read more 
                    
                     www.f-secure.com 
                    ISTP and F-Downadup Removal Tool. 
                    Read more  www.f-secure.com 
                    Social Engineering Autoplay and Windows 7. 
                    Read more  www.f-secure.com 
                    When is AUTORUN.INF really an AUTORUN.INF? 
                    Read more  forums.symantec.com 
                    Downadup: Playing with Universal Plug and Play. 
                    Read more
                     www.avertlabs.com 
                    Abusing Shortcut files. 
                    Read more
                     isc.sans.org 
                    Conficker's autorun and social engineering. 
                    Read more  www.secureworks.com 
                    Ozdok: Watching the Watchers. 
                    Read more
                     www.eweek.com 
                    Next Problem Up: Reverse User Name Hijackings. 
                    Read more
                     www.eweek.com 
                    Whois Abuse Still Out of Control. 
                    Read more
                     www.eweek.com 
                    Weak Passwords Make for Weak Networks. 
                    Read more
                     www.pcworld.com 
                    How secure is Firefox? 
                    Read more
                     sunbeltblog.blogspot.com 
                    New rogue: IE Security. 
                    Read more
                     sunbeltblog.blogspot.com 
                    New rogue: Total Defender. 
                    Read more
                     blog.spywareguide.com 
                    Fresh Wave Of IRS Tax Refund Phish...
                    Read more
                     blogs.paretologic.com 
                    Sweet home Alabama
                    Read more
                     ddanchev.blogspot.com 
                    Embassy of India in Spain Serving Malware. 
                    Read more
                     ddanchev.blogspot.com 
                    Exposing a Fraudulent Google AdWords Scheme. 
                    Read more
                     ddanchev.blogspot.com 
                    A Diverse Portfolio of Fake Security Software - Part Fourteen. 
                    Read more
                     blogs.paretologic.com 
                    Malware authors play tricks on researchers. 
                    Read more
                     blog.trendmicro.com 
                    Embassy Site Attack Reveals Other Compromised Sites. 
                    Read more
                     blog.trendmicro.com 
                    WALEDAC Loves (to Spam) You! 
                    Read more  blog.trendmicro.com 
                    Fake Brazilian Government Site Leads to Info-Stealers. 
                    Read more
                     ddanchev.blogspot.com 
                    Embedding Malicious IFRAMEs Through Stolen FTP Accounts - Part Two. 
                    Read more
                     research.microsoft.com 
                    A Profitless Endeavor: Phishing as Tragedy of the Commons. (pdf) 
                    Read more
                     zed.m6.net 
                    Dyne's Hackers List v1.0.
                    Read more
                    
                     wwwtbusiness.ca  
                    Finding yourself online - information about you available on the Web. 
                    Read more
                     www.podtrac.com 
                    Audio. Security Now 180: Listener Feedback 58.
                    Listen
                    
                     www.podtrac.com 
                    Audio. Security Now 179: Cracking Security Certificates. 
                    Listen    
                    News 
                    www.darkreading.com 
                    Microsoft Releases Security-Enhanced Internet Explorer. 
                    Read more
                    www.theregister.co.uk 
                    Mayor Boris backs McKinnon in extradition fight. 
                    Read more
                     www.theregister.co.uk 
                    DDoS attack boots Kyrgyzstan from net. 
                    Read more
                     www.theregister.co.uk 
                    MyBarackObama profile hack punts malware. 
                    Read more
                     www.foxnews.com 
                    Hackers Get Details of 4.5 Million Monster.com Members. 
                    Read more
                     mdn.mainichi.jp 
                    Man breaks into apartment, installs computer virus to steal banking details. 
                    Read more
                     www.computerworlduk.com 
                    Hackers prepare Valentine's Day botnet campaign. 
                    Read more
                  |