Thursday, October 19, 2006


Government spoof logo

**A spokesman for the Department of the Interior explained that their ultimate goal is to block all weblogs, not just conservative blogs. He gave two justifications for the policy: that blogs are not work-related, and that blogs are offensive.

Guess the thought to post a simple notice is too simple a solution.

Porn sites = Trojans and key loggers.
Poker sites = Viruses Loggers & Trojans

Severe penalties apply to accounts who expose
this PC station to compromise and/or infection:
You are warned! = *US Dept of Interior*

Some Interior employees complained that only conservative blog sites were being blocked. The news was broken by
Gates of Vienna, a conservative political blog. Gates of Vienna posted an e-mail from an Interior employee that listed 15 conservative sites that were blocked and seven liberal blogs that were not blocked. Quimby said a review of access to 22 blogs on Oct. 13 showed that only five of the 15 conservative sites were blocked while two of the seven liberal sites were blocked.

Either way, all blogs will be blocked as the new Internet filters are fully rolled out, Quimby said.
Sean Gleeson

= TG

October 20-21 / 06 Heads up.

Vancouver Sun (subscription) - British Columbia, Canada
... people. The Bandito-BE trojan horse is flooding e-mail users around the world this week with the subject line Photos of TATU

[Do not be taken in by Raunchy photos of Russian Duo] ]lesbians

eWeek - New York, NY
Veteran malware researcher Joe Stewart was fairly sure he'd seen it all until he started poking at the SpamThru Trojanā€”a piece of malware designed to send ...

[ Installs its own virus scanner ] Wow?,1895,2034680,00.asp

SDA India Magazine - Singapore
A malicious Trojan Downloader concealed in a spoofed e-mail message claiming to be from Microsoft is doing the rounds. The e-mail ...
[ beware of from: ]

= TG
Key Loggers and silence.

A busy company executive in a hotel foyer, anywhere in the world. Equipped with the latest IT gadgetry including a laptop/notebook.
As he or she impatiently awaits a taxi to the airport, there's time to check e-mails. Especially to find out if that overdue BACS payment has been paid into a business account.
Laptop connection to a local hotspot is made wirelessly and logging-on is completed in seconds. Hang on, the firewall detects a Trojan virus trying to infiltrate the system.
Nothing unusual here, and it's dealt with. Or so it seems. But out of sight a keylogger has piggybacked onto the Trojan, with somebody, somewhere picking up each tap, tap, tap.

The damage is done and money and/or data falls into unscrupulous hands.
Later, it's discovered the internet service provider was located in the Far East. If it's funds transferred out of a business account, well they can often be replaced. But if commercial espionage is at work and data stolen, eventually sold to a competitor or highest bidder, then that can be irreplaceable.

If things weren't bad enough, there's now a system that not only records keystrokes made on the infected computer, but also captures mouse clicks.
Latest Forrester Research analysis points out that keylogging is less likely to be detected than other types of hacking into a system. Such is the potential damage caused, that Morgan Stanley recently issued a *fix it or lose it* ultimatum to business. The investment bank claimed that for the internet to be "a truly reliable and trusted commerce mechanism," protecting a transaction's source is imperative.

Smart Cards, [ when they become common here as they are in Europe], will certainly cut down on losses to key loggers. Until then, there is no real security on the net. = TG
Post a Comment

<< Home

This page is powered by Blogger. Isn't yours?

Get your Google PageRank