Monday, March 06, 2006

February's Security Streams

It's about time I summarize all my February's Security Streams, you can of course go through my January's Security Streams as well, in case you're interested in what was inspiring me to blog during January. The truth is - you, the 4,477 unique and 580 unique visitors returning during the entire February, and as this blog is melting down due to its audience and content, thanks for your time! As a matter of fact, it's been a while since I've last participated in students' thesis, but who knows these days :)



1. "Suri Pluma - a satellite image processing tool and visualizer", treat tool I recommended to everyone interested in that type of tools, as a matter of fact, I also got many other suggestions for alternatives. More on visualization



2. "CME - 24 aka Nyxem, and who's infected?" a small update on the Nyxem threat if any during February

3. "What search engines know, or may find out about us?"" a commentary on a CNET's Q&A with leading search engines on how they deal with subpoenas and user's privacy, further resources and opinions on the topic are provided as well. Anything that can be linked will be one way or another.



4. "The current state of IP spoofing" introducing the ANA Spoofer Project, commentary on the current state according to their sample, and many other distributed concepts again related to security are mentioned



5. "Hacktivism tensions" A brief coverage of the mass defacements of Danish sites out of the Muhamad's cartoons distribution over Europe, and of course, over the Net. I also mentioned a previous rather more severe case or Nation2Nation cyberwarfare PSYOPS attacks



6. "Security Awareness Posters" a small list with links to free security awareness posters worth using or enjoying their witty messages



7. "A top level espionage case in Greece" With the great possibility of an insider's job, the eavesdropping of major government officials and citizens was indeed the second case that made me an impression, next to the stone transmitter found in a Moscow's park



8. "The War against botnets and DDoS attacks" A post covering the introduction of McAfee's bot killing system, The ZombieAlert Service, some comments and lots of external resources on fighting and protecting against Botnets and DDoS attacks



9. "Who needs nuclear weapons anymore?" An in-depth article I wrote while coming across a news article on a recent EMP warhead test, with the idea to bring more awareness on the potential of EMP weapons, some of the current trends, and the emerging weaponization of Space . A reader also mentioned a Mig-25 found on Google Maps



10."Recent Malware developments" a post summarizing various events right in the middle of February, discussing some of the emerging trends to keey an eye on, a a commentary on Kaspersky's summary for 2005, worth checking out as well



11. "Look who's gonna cash for evaluating the maliciousness of the Web?" Crawling for malware and evaluating the maliciousness of the Web with automated patrol for sites distribution it is a very hot and feasible topic you can learn more about by reading this post



12. "Detecting intruders and where to look for" comments and external resources related to rootkits and forensics



13. "A timeframe on the purchased/sold WMF vulnerability" as requested by readers



14. "The end of passwords - for sure, but when?" As my first blog post was related to passwords security and why bother given their major insecurities, in this post I commented Bill Gate's remarks. I think they don't know what they are really up to at the bottom line



15."Smoking emails" Would you pay millions to avoid paying billions and keep a clean image? Of course you will!



16. "DVD of the weekend - The Lone Gunmen" the first post related to DVDs worth watching over the weekend



17. "How to win 10,000 bucks until the end of March?" Find a critical, as defined by Microsoft's security bulletins, vulnerability, participate in the market for software vulnerabilities - the future 0bay, and sell it to iDefense for 10,000 bucks, but what about the social outcome out of the process, if any?



18. "Chinese Internet Censorship efforts and the outbreak" recent events related to the Chinese efforts to monitor and censor the web, the the "West's'"reactions. I did quite a lot of quality posts on the topic during January and February mainly because I feel that the higher the publicity for the problem, the higher the pressure towards starting talks on the future of these efforts



19. "Master of the Infected Puppets" comments on botnets communication provoked out of a nice research I came across to



20. "Give it back!" Mixed signals from the CIA, DIA and the DoJ on secrecy



21. "One bite only, at least so far!" a brief coverage of the OS X trojan and the InqTana worm



22. "DVD of the Weekend - The Outer Limits - Sex And Science Fiction Collection" weekend two, second DVD



23. "Get the chance to crack unbroken Nazi Enigma ciphers" another distributed concept this time cracking unbroken Nazi messages



Technorati tags :
,