Security Corner:


June 30, 2009  1:32 AM

Accused Spam King Alan Ralsky Pleads Guilty

Posted by: Ken Harthun
Botnet, Cybercrime, E-mail scam, Scam, spam

Once again, I’m behind on the news. This Security Fix report is almost a week old:

Alan Ralsky, a 64-year-old...

June 29, 2009  7:01 PM

Spam, Phishing, and Malware Related to Recent Celebrity Deaths

Posted by: Ken Harthun
Cybercrime, E-mail scam, Identity Theft, Malware, Phishing, Scam, Social Engineering

Michael Jackson malware? Farrah Fawcett phishing attempts? Billy Mays spam? Ed McMahon notifies you—from the other side of the grave--that you’ve just won the million-dollar Publisher’s Clearinghouse (but you have to send him some money, first)? Yes, expect it. US-CERT is monitoring...

June 18, 2009  9:29 PM

How to Use the Windows Registry for Cyber Forensics: Part 2

Posted by: Ken Harthun
Cyber Forensics, Cybercrime, Encryption, Hacking, Intrusion detection

In Part 1 of this series, I introduced you to the concept of date/time coincidence and we explored five registry keys that are useful to the forensic examiner. This time, I'll show you how data can be encrypted and hidden in the registry. If you're involved in data security, you're familiar with...

May 31, 2009  7:38 PM

Are YOU a Hacker?

Posted by: Ken Harthun
Cybercrime, Hacking, Opinion, Security

Are you? It’s not necessarily a derogatory term. Neither is “geek.” But what does “hacker” really mean? Here’s one opinion:

Someone that is...

May 29, 2009  1:59 AM

ID Analytics Service Validates Identity Exposure Index

Posted by: Ken Harthun
Cybercrime, Identity Exposure Index, Identity Theft, Security, Security management

A new, free service offered by ID Analytics,, validates my Identity Exposure Index concept I proposed last month (What’s Your Identity...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

May 27, 2009  8:25 PM

How to Use the Windows Registry for Cyber Forensics: Part 1

Posted by: Ken Harthun
Computer Forensics, Cyber Forensics, Cybercrime, Microsoft Windows, Security, Windows Registry

I recently completed the free SANS mini-course on cyber forensics (see my post, Free Mini-courses from SANS). That course could not have shown up at a more opportune time as I had just...

April 10, 2009  11:46 PM

Conficker’s raison d’etre? Profit, of Course

Posted by: Ken Harthun
Anti-malware, Anti-virus, Botnet, Conficker, Cybercrime, Scam, Scareware, Security, Worm

More than a week after Conficker’s much-hyped April 1st activation date, the botnet has come to life and is using a P2P communication system to update itself on what is believed to be millions of infected PCs. Along with the update, the worm is downloading

February 25, 2009  1:52 AM

Beware the Phone Phishing Scam

Posted by: Ken Harthun
Cybercrime, Password, Phishing, Scam

In my area, there has been a rash of phishing calls targeting bank customers. Coincidentally, today's WXP News (Vol. 8, #59 - Feb 24, 2009 - Issue #367) addresses the same issue:

You might never click a link in an email purporting to be...

February 18, 2009  5:05 PM

Scareware–Using Fear & Deception to Dupe Consumers

Posted by: Ken Harthun
Anti-malware, Anti-virus, Cybercrime, Malware, Scam, Security, Virus

You're checking out your favorite web sites when out of the blue a scary message appears on your desktop, which may look like the picture below, or it may just be a box that says "Warning! Spyware detected on your computer!"

February 10, 2009  3:02 AM

OpenDNS Service to Track and Block Conficker Worm

Posted by: Ken Harthun
Anti-malware, Conficker, Cybercrime, Malware, OpenDNS, Security, Worm

With some estimates placing the number of computers infected by the Conficker worm at 10 million or more, Conficker has the potential to become one of the biggest botnets ever. Given that many system administrators probably don't...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: