Folks, I am a bit sick of hearing “cloud” used as the latest buzzword to describe anything from a simple website hosted on a shared server sitting in a datacenter…
Category: INFOSEC
Admin Note: This post is in response to a recent posting I made regarding Google’s wireless collection activities. This “Security Short” provides some brief information on improving the security of…
Enterprises develop policies for protecting all kinds of assets, both physical and virtual. Some of these policies cover Operations Security or OPSEC. Examples of OPSEC include not displaying your company…
Admin Note: This post is in response to a recent posting I made regarding Google’s wireless collection activities. This “Security Short” provides some brief information on improving the security of…
Folks, the Internet and media have run amuck about Google capturing data while roaming the streets in order to provide you, the Google Maps user, with Street View data. Google’s…
The following IP addresses were caught in one of my honeypots uploading malicious software. Often times they attacked the server several times with the same sample. Below are the IP…
Project Black Water I have started a new project that I am refering to as “Project Black Water.” This project aims to discover malicious IP addresses. These IP addresses are…
Here is a list of the malware that has been received by my honeypot: 14a09a48ad23fe0ea5a180bee8cb750a: Trojan.SdBot-9861 FOUND 5ae700c1dffb00cef492844a4db6cd69: Worm.Blaster.A FOUND 93094c5ea5a47e5c5f3e020f2c434c35: Trojan.SdBot-9861 FOUND 833cda5b5bef5989deb6bf57c557ce30: Trojan.SdBot-9861 FOUND f8815cdca238ad5ab566f05f5a6335a4: Trojan.SdBot-9861 FOUND cf263991bb889c28e6185ac4dd24668f:…
Well, I have been working on a new project to trap and analyze malware. I have configured a honeypot on the Internet to trap people out to infect other machines.…