Feed

Tools and Standards for Cyber Threat Intelligence Projects

Posted on October 24th, 2013 in New Domains,News,Off Topic by dglosser

A new whitepaper by SANs:

Tools and Standards for Cyber Threat Intelligence Projects

Interesting reading, especially Page 11 :)

This is a first

Posted on October 22nd, 2013 in Off Topic by dglosser

We’ve been threatened with a lawsuit… because we have NOT listed a website!

 

Sinkholed Domains

Posted on June 16th, 2013 in Off Topic by dglosser

Should we list domains which are already sinkholed?

It would be useful if you are  capturing and analyzing information….

However, it does limit the amount of research and data that the legitimate companies will be receiving regarding the sinkholed domains…

Email us your thoughts at 124malwaredomains5@9gmail.3com (remove all numbers)

 

 

 

 

Resources for Hacked Sites

Posted on May 22nd, 2013 in General Security,Off Topic by dglosser

Some nice resources on what to do if your site was hacked:

If you find a nice (noncommercial preferred) resources, let us know and we’ll add it to our list

 

Off Topic: DevOps Reactions

Posted on May 13th, 2013 in Off Topic by dglosser

Off Topic but too funny not to pass on:

http://devopsreactions.tumblr.com/

 

New program will eliminate all malware!

Posted on April 1st, 2013 in Off Topic by dglosser

FOR IMMEDIATE RELEASE (April 1 2013)

New program eliminates all malware and viruses!

We are proud to announce a new program, which, once installed, will eliminate all viruses and malware on your computer as well as “sniff” out any local machines and remote install itself to ensure those machines are not infected as well.

Bonus! By installing it on a bluetooth enabled device, and riding the subways and busses, you will be doing your fellow commuters a favor by ensuring their smartphones and laptops are cleaned up and never infected again as well.

This new techology uses “scent-ware” technology and works with Google Nose to “sniff” out new malware and viruses.  Click here to download and beta-test this new exciting application!

twitter page

Posted on March 12th, 2013 in Off Topic by dglosser

we are testing a twitter page…

https://twitter.com/malwaredomains

 

Linkedin Member Passwords Compromised

Posted on June 6th, 2012 in Off Topic by dglosser

Since the majority of viewers here also are members of linkedin,  if you haven’t already heard, linked had a huge password compromise..

http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/

We want to provide you with an update on this morning’s reports of stolen passwords. We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation and here is what we are pursuing as far as next steps for the compromised accounts:

 

Some reports say over six million passwords were exposed… http://technorati.com/social-media/article/six-million-linkedin-passwords-leaked/

We never share passwords across different sites, right :)

 

 

 

 

OT: “But it’s Encrypted”

Posted on November 18th, 2011 in General Security,Off Topic by dglosser

At my “real job”,  I’m constantly getting push back from users,  ops people (netadmins sysadmins, etc) and developers about security.  For example:

  • “This isn’t the pentagon”
  • “We can’t do our work”
  • “But it’s encrypted and the key is only by two different people”
  • “You say it’s an security issue but we haven’t been hacked so far so how much of a risk can it be”

At first glance, of these statements seem valid and reasonable (especially when it’s presented to upper management).

When management comes to you with these statements,  these needs to be simple, concise answers (maybe two, for both technical and non-technical users)

How many of you have received these arguments from users?
What other arguments have you received?
How have you responded?   (especially if you “won” the argument and convinced the user and manager)

We’ll collect the responses and summarize. Email us at 12malware8domains789@32gmail33.com33 (remove numbers)