* Posts by mdubh

11 publicly visible posts • joined 21 Apr 2006

Google leaves censorship to China's experts

mdubh

Further reading

http://intelfusion.net/wordpress/2010/01/13/google-threatens-to-close-google-cn-is-google-ru-next

Feds quiz former worker over Texas power plant hack

mdubh
Flame

Where's the hack?

"Texas utility provides disgruntled ex-employee with remote access to sensitive nuclear plant computers and files."

Sigh...

Missing: 1TB of Clinton White House data

mdubh
Pirate

Reward?

Why bother offering a reward for its return? Why not bid for it on ebay like everyone else?

Hackers develop 'memory-scraping malware' to steal PINs

mdubh

@AC: Memory scraping

http://wiredbytes.com/node/6

http://content.zdnet.com/2346-9595_22-189068-4.html

VeriSign remedies massive SSL blunder (kinda, sorta)

mdubh
Flame

Wrongheaded

Yet another case of foolishly continuing to use a known-broken technology because an easily workable attack, although foreseen and anticipated, has not yet been publicly announced.

Cryptographers have known about weaknesses in MD5 and recommended alternate hashing algorithms since 1996, yet Verisign only now discontinues use of MD5.

Serious DNS flaws have been known for many years, but only the Kaminsky disclosure has brought any real DNSSEC deployment efforts.

Likewise Microsoft and other developers sit on patches until an exploit has been publicly announced and is in the wild, and end users often hesitate to deploy patches that have been released.

Sure there are deployment challenges and costs, but simply doing nothing while vainly hoping that everything will be allright is an unacceptable option that saddles us all with an intolerable burden of risk.

New trojan in mass DNS hijack

mdubh
Stop

@John Navas & Big Al

According to Wikipedia:

"As of August 2008, OpenDNS provides geographically distributed servers in Seattle, Palo Alto, New York, Washington, D.C., London, and Chicago."

Agency sues to stop Defcon speakers from revealing gaping holes

mdubh

Why paint a target?

D'oh!

When will BlackHat presenters learn to conceal the identity of the organization whose dirty laundry they are about to expose, until they actually deliver the presentation?

No advance notice, no prior restraint.

Black hats attack gaping DNS hole

mdubh

Re: gentoo portage up to date?

@robert

BIND 9.4.2-P1 should be immune to this issue:

http://www.isc.org/sw/bind/bind-security.php#matrix

Is your DNS server behind a proxy firewall or NAT device that is de-randomizing the source ports?

http://support.microsoft.com/kb/956190

Excuse me sir: there's a rootkit in your master boot record

mdubh
Boffin

How it works / how to detect

More info on the operation and detection of this rootkit:

http://www.heise-security.co.uk/news/101463

eBay employee 'torpedos' fraud trial

mdubh

Rampant fraud

Just thought I'd add my name to the list of people who have been defrauded on eBay, and I would encourage everyone with a similar experience to do the same to help reveal the true scope of the problem.

In my case, the seller never shipped and was soon delisted, but neither eBay nor PayPal responded (beyond the initial acknowledgement) to my repeated requests for an update of the status/resolution of my claim. Fortunately the amount was small.

@Neil: Actually, if you check your passport, you will find that Northern Ireland is indeed part of the "United Kingdom of Great Britain and Northern Ireland". So UK yes, GB no.

We're winning the war against hackers

mdubh

Sure we're winning

The number of security vulnerabilities being found, and the range of applications and platforms affected, is definitely not shrinking. The sophistication of organized criminals improves constantly. As the popularity of rootkit technology skyrockets, the total number of compromised computers is unknown but definitely growing.

So are we winning the war against hackers? Just as surely as we're winning the war in Iraq...