Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


duncan last won the day on December 26 2012

duncan had the most liked content!

Community Reputation

3 Neutral

About duncan

  • Rank
    Advanced Member

Profile Information

  • Gender
  • Location
  • Interests
    Cloud and general internet security applications.
  1. http://www.malwarecity.com/blog/all-data-stored-on-your-smartphone-gone-in-60-seconds-1156.html
  2. sounds like a rootkit has slowly mated and spawned. I don't have to worry about that stuff these days (linux) but I had a similar experiance last year, it was more devastating though and took a couple of days to get fully back up to where I was.
  3. http://www.scmagazine.com.au/News/271535,microsoft-global-cloud-blacks-out.aspx
  4. bit off topic but related to thread. http://www.securitypark.co.uk/security_article266694.html
  5. All it takes is a few immunet staff or appointed moderators to monitor their specific forum area. These individuals should have the ability to immediately remove any posts that are suspect for more scrutiny. ( this should not take up much time or effort if forum areas are split between mods) Appointed forum areas should then be inspected say twice per 24 hours.
  6. Well at the end of the day, why do you think sourcefire paid $21 million to aquire immunet? It is a major business concern. When I was using windows, I was extremely happy to be able to triple my main internet security by using MSE and Immunet along with Comodo firewall. (all free products) and if I was still using windows I would be happy to pay an annual fee for Immunet plus. As stated above by WacoJohn the initial concept of community and the overheads now required have changed (as all things do) There is a simple option > if a person is not satisfied with a given product, then they can always use another product. That said I believe that Immunet is still one of the best anti-malware products available.
  7. `I doubt that SMSes & Voice Calls are being hacked! ' You seem to be extreme in your requirement for internet security. And yet all anyone really needs to do is familarise and harden a linux installation to enjoy secure browsing and a lightning fast system responce. Phones are getting hacked to oblivion and back, anyone that is targetted can have every phone call and every text message recorded and used for whatever purpose that the hacker requires. The technology to intercept mobile phone traffic is initiated by the telecommunications industry, this technology is passed to law enforcement agencies, the technology is then available to organised crime syndicates via corruption and other methods. A classic example is the use of this technology by outlaw motorcycle gangs such as the hells angels. If you do not believe this is true, then so be it, but I am afraid it is. Wireless transmissions of any kind are open to abuse. Also ISP's have access to all internet traffic including any website that a client might access as well as any emails, instant messages, etc. (and they keep logs of all internet activity) Out of the hundreds of thousand telcos, law enforcement agencies and ISP's it is only logical that a certain amount of corruption exists. You don't seem to fully understand that all the internet security is useless if the wrong people want to watch what an individual or organisation is doing. Why do you think that anon has been severely disrupted by global government and law enforcement? This is not some half baked paranoia, it is reality. So if someone wanted to record your mobile phonecalls/text messages and they had the right contacts, then it would be recorded.
  8. The file that helped hack RSA found by Tom Brewster on Aug 28, 2011 The RSA hack was months ago now, but the file and email which helped compromised the security giant has just been found. F-Secure believes it has discovered the file and the email which helped crack EMC’s security arm RSA, in what became one of the most famous hacks in history earlier this year. Timo Hirvonen, an F-Secure analyst, doggedly pursued the XLS file used to hack RSA even after others had given up the chase. Hirvonen created a tool to analyse samples for a Flash object, which was used to exploit the target’s system. “The new tool located several relevant samples. However, one of them was not an Excel file. It was an Outlook message file (MSG),” an F-Secure blog read. “When Timo opened it up, he knew he was onto something. The message file turned out to be the original email that was sent to RSA on 3 March, complete with the attachment 2011 Recruitment plan.xls. After five months, we finally had the file. And not only that, we had the original email.” The email which was sent to a single EMC employee, with two others CC’d in, was made to look like it came from Beyond.com, a career network. The subject line read "2011 Recruitment plan" and the body copy contained just one line: "I forward this file to you for review. Please open and view it." Once the file was opened the Flash object was executed by Excel, using a vulnerability to write code on the victim’s machine and then drop a Poison Ivy backdoor to the system. Excel is then closed automatically and the infection is done. “After this, Poison Ivy connects back to it's server at good.mincesur.com. The domain mincesur.com has been used in similar espionage attacks over an extended period of time,” F-Secure said. “Once the connection is made, the attacker has full remote access to the infected workstation. Even worse, it has full access to network drives that the user can access. Apparently the attackers were able to leverage this vector further until they gained access to the critical SecurID data they were looking for.” As F-Secure noted, the attack itself did not appear to be hugely sophisticated, although as the vulnerability was a zero-day there was no way RSA could have protected itself by patching. “Was this an advanced attack? The email wasn't advanced. The backdoor they dropped wasn't advanced. But the exploit was advanced,” F-Secure added. “And the ultimate target of the attacker was advanced. If somebody hacks a security vendor just to gain access to their customers systems, we'd say the attack is advanced, even if some of the interim steps weren't very complicated.” The hackers who went after RSA wanted the company’s SecureID information so they could hit US Government contractors, including Lockheed Martin. Following the Lockheed attacks, RSA offered token replacement for customers “with concentrated user bases typically focused on protecting intellectual property and corporate networks.” This article originally appeared at itpro.co.uk
  9. `Hi, I will continue to use Mobile Phones as extra telephones only (no links to Internet or computers). For me security/safety is the major thing! Cheers, sweidre ' That may be the case but a huge percentage of people use their mobile for internet apps and the hacking includes txt and voicecalls...
  10. "then we can do trends on how malware travels between users before it is actually caught. The other advantage is that we can show how much you contribute counting you and the the links associated with your account." This surely gives the developers more information to work on, which in turn is beneficial to all? Immunet is marketed as a community based AV so it is not to their advantage to change this. The community aspect fosters more communication in the long run.
  11. I do recollect reading an online article re/ mobile phone av app. Pretty sure it was a sourcefire initiative, I cannot find anything on google relating to this however. A dated looking similar situation: http://thepcsecurity...ndroid-mobiles/ And 7 years ago it looked like it was going somewhere. http://www.pcworld.com/article/118834/trend_micro_gives_away_mobile_antivirus_app.html
  12. the other possible solution is that Sourcefire release an android app that acts as an anti-malware scanner for mobile phones. more android malware http://www.scmagazin...ing-charts.aspx
  13. http://www.infopackets.com/news/technology/mobile/2011/20110817_most_mobile_apps_unsafe_risk_id_theft_report.htm
  14. http://www.scmagazine.com.au/News/266537,trojan-update-fingered-for-massive-south-korean-breach.aspx
  15. More rootkits on the way by the looks of the turf war erupting: http://www.theregister.co.uk/2011/08/10/rootkit_turf_wars/
  • Create New...