Security History Poll

Published: 2006-03-03
Last Updated: 2006-03-03 19:33:28 UTC
by Pedro Bueno (Version: 1)
0 comment(s)

From some years already, every year you hear that this will be the 'Security Year', that companies will invest lots of money in security, that will be the 'Security Boom', etc,etc...but still, thing are happening slowly.

Today I was talking with some friends about security in companies...and thinking some years back, we were trying to figure out when we started to think about security in a serious way, that would cover all company, from security policy, hardening, security monitoring, access control,etc,etc...and we realized that there are not even 10-15 years...

Then I thought, why not ask our fellow readers about this, as a personal poll? So the question is , when did you/your company start to think about security in a serious way?

I know that some technologies and concepts are new, and that Gov't agencies are usually exception on this, but anyway, it would be interesting to know.

So, trying to not flood tomorrow's handler on duty, please answer directly to me. I will try to consolidate the answers and put in my next shift.

-----------------------------------------------------------------------------
Handler on Duty: Pedro Bueno ( pbueno //&&// isc. sans. org)
Keywords:
0 comment(s)

CME-24 (again)

Published: 2006-03-03
Last Updated: 2006-03-03 14:40:15 UTC
by Pedro Bueno (Version: 1)
0 comment(s)
Yes...it is CME-24 time again...
remember your Nyxem/Kama Sutra/Blackworm friend from last month?
Well...it is suppose to make its round again today, as today is the third day of the month, and "this destructive virus will delete files from a number of popular programs on February 3rd, and on the 3rd day of the month thereafter".
More info on this Blackworm special page.

Update:
While looking at F-secure blog , I saw their post about their Virus WorldMap.
It is quite nice! We will probably add it soon to our links page.
Btw, looks like nyxem (CME-24) affected mostly India this month...

------------------------------------------------------------------
Handler on Duty: Pedro Bueno ( pbueno //&&// isc. sans. org.)
Keywords:
0 comment(s)

Comments

What's this all about ..?
password reveal .
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure:

<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.

<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
https://thehomestore.com.pk/
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
https://defineprogramming.com/
https://defineprogramming.com/
Enter comment here... a fake TeamViewer page, and that page led to a different type of malware. This week's infection involved a downloaded JavaScript (.js) file that led to Microsoft Installer packages (.msi files) containing other script that used free or open source programs.
distribute malware. Even if the URL listed on the ad shows a legitimate website, subsequent ad traffic can easily lead to a fake page. Different types of malware are distributed in this manner. I've seen IcedID (Bokbot), Gozi/ISFB, and various information stealers distributed through fake software websites that were provided through Google ad traffic. I submitted malicious files from this example to VirusTotal and found a low rate of detection, with some files not showing as malware at all. Additionally, domains associated with this infection frequently change. That might make it hard to detect.
https://clickercounter.org/
Enter corthrthmment here...

Diary Archives