New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO9)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 564
Comments: 14
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: Crack Attack

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image Police Grab Suspected Hackers In Canada, Taiwan image
Crack Attack
May 28, 2004

By Gregg Keizer TechWeb News

Authorities in Canada and Taiwan this week brought charges against a teen for creating a worm and arrested a 30-year-old engineer for building a destructive Trojan horse, respectively.
Posted by IACOJ  on Saturday, 29 May 2004 @ 09:21:14 EDT (170 reads)
(» Read More... | 648 bytes more | TrackBack (0) | comments? | Score: 0)
image

image WeekEnd Feature: Hackers, Crackers and Gaps in the Wall image
Crack Attack

WeekEnd Feature:
Hackers, Crackers and Gaps in the Wall










by Ian Thompson, CCSP Staff Editor
May 15, 2004


This week has been a bit of a whirlwind. Not only have I had it up to here with some of the silly stuff going on at work, but also the Google news doohickey has come up trumps again. I mean, only last week we were all under a barrage of Sasser-related shenanigans, rewinding clocks (if we knew that this was a work-around) and patching lsass on affected PCs. Good ‘ol Windows 98, s’what I say to that one…
Posted by phoenix22  on Saturday, 15 May 2004 @ 09:18:06 EDT (1312 reads)
(» Read More... | 9256 bytes more | TrackBack (0) | 9 comments | WeekEnd Feature | Score: 5)
image

image News by the Boss!: GSM Phone Hijacking? image
Crack Attack

GSM Phone Hijacking?











by Paul Laudanski, AKA Zhen-Xjell
April 20, 2004


I've been a faithful GSM cellphone subscriber for years. Never had any issues. In fact, I was on the CDMA network for a couple years on a business cellphone and received SPAM SMS pages on occasion, but never on my GSM provided cellphone. Until now, and my Motorola Cellphone was hijacked!
Posted by phoenix22  on Tuesday, 20 April 2004 @ 09:35:08 EDT (1122 reads)
(» Read More... | 2755 bytes more | TrackBack (0) | 3 comments | News by the Boss! | Score: 5)
image

image Advisories!: Cross site Exploit Tried In My_Egallery image
Crack Attack
Anonymous writes "NovaServe has detected an apparent cross-site scripting exploit that has been launched via www.mirabela.net from russian cyberspace. The site lists http://big-big.com as its admin home and the curious can find the identities of the hackers portrayed on this page.
The exploit tries to inject new files into the My_eGallery folders exploiting an apparent bug in My_eGallery. Users are advised to ban the following IP's as a first step in safe-guarding their installations.
80.96.
66.218.79.186
Updating the script to version 2.79 is also advised.

The following is the content of the injection script found at mirabela:"
Posted by phoenix22  on Thursday, 18 March 2004 @ 10:03:59 EST (597 reads)
(» Read More... | 1861 bytes more | TrackBack (0) | comments? | Advisories! | Score: 0)
image

image Incident Response: Hackers: who are they and how can they be stopped? image
Crack Attack
Photo

Hackers: who are they and how can they be stopped?

Bryan Glick
[03-03-2004]



'If you know the enemy and know yourself, you need not fear the result of a hundred battles.'

This classic quote from the 2500 year old Chinese book on military strategy, The Art of War by Sun Tzu, has been more recently applied to many areas of business.

In the IT world, perhaps it is appropriate to the most talked-about issue in the industry today - the fight against cybercrime.
Posted by cj  on Wednesday, 03 March 2004 @ 12:40:31 EST (464 reads)
(» Read More... | 1304 bytes more | TrackBack (0) | comments? | Incident Response | Score: 0)
image

image Beware!: State agency warns of security breach image
Crack Attack




State agency warns of security breach
By Ina Fried
CNET News.com
February 13, 2004, 10:06 AM PT

Some California workers may have had their salaries and other personal information compromised after someone gained unauthorized access to a state agency's computer.
Posted by phoenix22  on Friday, 13 February 2004 @ 18:27:42 EST (397 reads)
(» Read More... | 3128 bytes more | TrackBack (0) | comments? | Beware! | Score: 0)
image

image Busted!: Infiltration of files seen as extensive image
Crack Attack

Infiltration of files seen as extensive



By Charlie Savage, Globe Staff
1/22/2004



Senate panel's GOP staff pried on Democrats
WASHINGTON -- Republican staff members of the US Senate Judiciary Commitee infiltrated opposition computer files for a year, monitoring secret strategy memos and periodically passing on copies to the media, Senate officials told The Globe.
Posted by phoenix22  on Friday, 23 January 2004 @ 19:33:59 EST (385 reads)
(» Read More... | 6748 bytes more | TrackBack (0) | comments? | Busted! | Score: 0)
image

image The Courtroom: Homeless Hacker Pleads Guilty image
Crack Attack
Homeless Hacker Pleads Guilty

Lamo could face five years in prison, hefty fines.

Paul Roberts,
IDG News Service

Adrian Lamo, the so-called homeless hacker, pleaded guilty this week to charges that he broke into the internal computer network of The New York Times.
Posted by phoenix22  on Sunday, 11 January 2004 @ 09:33:20 EST (299 reads)
(» Read More... | 3059 bytes more | TrackBack (0) | comments? | The Courtroom | Score: 0)
image

image Security HeadLines: Electronic Voting Firm's Site Hacked image
Crack Attack
Electronic Voting Firm's Site Hacked
By Ted Bridis,
AP Technology Writer
December 29, 2003

WASHINGTON (AP)—A company developing security technology for electronic voting suffered an embarrassing hacker break-in that executives think was tied to the rancorous debate over the safety of casting ballots online.
Posted by phoenix22  on Tuesday, 30 December 2003 @ 04:10:00 EST (351 reads)
(» Read More... | 2533 bytes more | TrackBack (0) | comments? | Security HeadLines | Score: 0)
image

image Commentaries: More, Worse Cyberattacks Seen Coming in 2004 image
Crack Attack
More, Worse Cyberattacks Seen Coming in 2004
by Paul Roberts

The New Year will offer weary network administrators little respite from a new generation of Internet worms, viruses and targeted hacks that appeared in 2003, according to security experts.


In 2004, malicious hackers will continue to take advantage of security weaknesses in popular communications protocols such as Remote Procedure Call (RPC), while improvements in hacker tools will shorten the time that technology vendors and their customers have to respond to new vulnerabilities, according to comments by leading security researchers and corporate security experts at the InfoSecurity 2003 Conference and Exhibition in New York City last week.
Posted by phoenix22  on Wednesday, 17 December 2003 @ 04:15:00 EST (355 reads)
(» Read More... | 2992 bytes more | TrackBack (0) | comments? | Commentaries | Score: 0)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication