Malware RSS Feed
A new ransomware Trojan is on the loose. The attackers give you roughly three days to pay them, otherwise your data is gone forever.
During 11-12 October, the "Information Security Workshop in Echigo-Yuzawa 2013" in the location, Echigo-Yuzawa, is famous for its hot springs. About 300 people attended the event.
In this post, Timur Snoke describes maps he has developed that use Border Gateway Protocol routing tables to show the evolution of public-facing autonomous system numbers.
In this post, Will Dormann describes how to get BFF 2.7 to run on OS X Mavericks.
Recently we attended Hack In The Box 2013 at the Hotel Intercontinental in Kuala Lumpur http://conference.hitb.org/hitbsecconf2013kul/. This conference has its roots in a small gathering of Malaysian security specialists back in 2002 and since then has also been held in the Netherlands, Dubai and Bahrain.
In this post, Deana Shick and Angela Horneman discuss how the Internet Census 2012 project helped them better understand devices associated with various sets of IP addresses.
In this post, Matt Collins describes how the CERT Insider Threat Center logs and analyzes data in the MERIT database.