On Using Fake Data to Generate Alerts
Here's a tip of Mikko's from September:Tip: Insert unique fake users and customers into your production databases, then set up a Google Alert to notify you if they get leaked.— Mikko Hypponen (@mikko)...
View ArticleCool Exploit Kit is Related to Blackhole
Two months ago, Karmina and Timo wrote about clear similarities between the Cool and Blackhole exploit kits. Blackhole seemed to be copying (or perhaps replicating is a better word) techniques and...
View ArticleVersions of Internet Explorer Still Vulnerable
One week ago, it wasn't yet clear if Microsoft would be able to quickly patch Internet Explorer's latest vulnerability.Microsoft Security Advisory (2794220)We now know it isn't part of January's...
View ArticleOn the Topic of AV Being Useless
I have lately been following and participating in discussions as to whether or not antivirus products are useless and just waste of money. And as I am employed by F-Secure, my position on the matter...
View ArticleThe Forrester Wave + Software Updater
Our Corporate Security Business team has been making a lot of smart decisions lately (or it seems so to us anyway). And that's reflected in this quarter's The Forrester Wave. Congrats guys!Another...
View ArticleObit: Aaron Swartz
Unfortunately, I didn't know much about Aaron Swartz until after his death.Of the things that I have now read about him, I think The Economist says it best: Remembering Aaron Swartz: Commons manOn...
View ArticleJava & IE Patches + Prompts
Microsoft is releasing an out of cycle security update for users of Internet Explorer 6-8.According to Microsoft: "While we have still seen only a limited number of customers affected by the issue,...
View ArticleEvery Month is Red October
By now, you've probably read the news about "Red October" and you're wondering how worried you should be? Red October is the latest AV industry case study of digital espionage. (Kaspersky Lab's post...
View ArticleProtecting Against Attacks Similar to "Red October"
The targeted attack campaign dubbed Red October raises an interesting question for people working on the frontline of corporate security. How to defend one's own organization against such attacks? And...
View ArticleComputer Security Circa 1990
Hackers with a cause. They're a danger to your corporate network!This 1990's set of computer security films were originally produced as a wake-up call for the executives at AT&T Bell...
View ArticleYear 2038 problem
Today is the 19th of January, 2013. Which means 19th of January, 2038 is now exactly 25 years away from us.Why does it matter? Because at 03:14:07 UTC on 19th of January 2038 we will run into the Year...
View ArticleUniversity Courses on Reverse Engineering and Malware Analysis
Today marks the commencement of the first lecture for our spring 2013 semester Reverse Engineering Malware course for the Aalto University (Espoo campus) in Finland.As with the previous courses we've...
View Article10th Anniversary of the Slammer Worm
This is how January 25th started for us, 10 years ago:Jan 25 05:31:54 kernel: UDP Drop: IN=ppp0 SRC=207.61.242.67 DST=80.142.167.238 TTL=117 ID=30328 PROTO=UDP SPT=2201 DPT=1434 LEN=384The above...
View ArticleUniversal Plug and Pray
From the files of things that really shouldn't surprise us: Rapid 7 released a white paper today on its research of the global exposure of Universal Plug and Play (UPnP) enabled network devices.The...
View ArticleFacebook's Graph Search: Clear Your Searches
I'm testing out Facebook's new Graph Search today.Graph Search: Friends of my friends who are women and live near Helsinki, Finland. Result: More Than 1,000 People (actually 799).Let's try something a...
View ArticleNew York Times Hit with Targetted Attacks
The New York Times had a major scoop today — on The New York Times. Turns out, they were hacked.In fact, they were hacked for several months. Chinese hackers stole the corporate passwords for every...
View ArticleMore Facebook Graph Search Suggestions
Yesterday as I was testing Facebook's Graph Search, which is in Beta, I searched for the following: women who live in Helsinki, Finland and who like sushi. (I wanted something that would get lots of...
View ArticleWhat is Java technology and why do I need it?
Why do I need Java?Here's what java.com says:"Java is fast, secure, and reliable."Secure? The U.S. Department of Homeland Security doesn't seem to think so. And neither does Apple, Mozilla and...
View ArticleDownload: H2 2012 Threat Report
What's been demanding our attention in the second half of 2012? Discover the answer to that question in our H2 2012 Threat Report! It pretty much sums up all the important cases we've seen from July...
View ArticleUpdate: Flash Player Exploit Targeting Macs and Windows
On Monday, we speculated that recent Java exploits may have been used to hack the Macs of Twitter employees. And today there's a Flash Player update, and Adobe reports the patched vulnerabilities are...
View Article