New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO9)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 526
Comments: 13
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image Be Advised!: (ISC)2 experiences its own problems with Security image
Cyber Security
(ISC)2, or International Information Systems Security Certifications Consortium, Inc., is a training and security body that administers the ever-popular CISSP certificate, the Holy Grail of security specialists. Recently (ISC)2 ran a web survey which was found to have leaked an estimated 20,000 particpants addresses, phone numbers, and emails.
Posted by Paul  on Friday, 04 June 2004 @ 15:09:40 EDT (6 reads)
(» Read More... | 688 bytes more | TrackBack (0) | comments? | Be Advised! | Score: 0)
image

image Browsers: Opera Browser Phising image
Phishing
Greymagic software released its security advisory GM#007-OP yesterday announcing that Opera Browser users while using favicons (shortcut icons) in their browser bar and/or favorites may be injected with a hostile domain name leading Opera to think it is in fact trusted.
Posted by Paul  on Friday, 04 June 2004 @ 14:50:35 EDT (6 reads)
(» Read More... | 913 bytes more | TrackBack (0) | comments? | Browsers | Score: 0)
image

image Vircom says less than 15% spammers comply to FTC's pornography image
Computer Cops
Anonymous writes "Montreal, June 3, 2004 - Press Release - Montreal-based Vircom, developer of Modus e-mail security solutions, said its SpamBuster Team observed less than 15% compliance with the recent FTC rule for labeling e-mail containing sexually oriented material. "
Posted by IACOJ  on Friday, 04 June 2004 @ 10:51:59 EDT (13 reads)
(» Read More... | 2509 bytes more | TrackBack (0) | comments? | Score: 0)
image

image Spyware: Yahoo Plays Favorites with Some Adware image
Yahoo!
By Matt Hicks
June 1, 2004

When it comes to blocking intrusive Internet software, Yahoo Inc.'s new Anti-Spy gives adware the benefit of the doubt.
Posted by IACOJ  on Friday, 04 June 2004 @ 09:49:43 EDT (28 reads)
(» Read More... | 1604 bytes more | TrackBack (0) | comments? | Spyware | Score: 0)
image

image Featured Commentary: To Tolerate or not to Tolerate? image
Computer Cops

Featured Commentary:
To Tolerate or not to Tolerate?









by Bill Gray, CCSP Staff Writer
June 3rd 2004


What do I mean, tolerate, don’t we have to tolerate things in our lives? Well I say, maybe not!

You see, tolerations (those things that we tolerate) are great energy suckers, good time blockers, all round bad guys! I would go as far as saying that if we cleared up a few, we would feel far better than we do right now. I would compare these to the viruses and spyware that we get on our computers, only they aren’t in the computer, they are in us! You know how annoying pop ups are, well the same thing applies to tolerations, they pop up and slow down the action you are on as you have to deal with them. Once you have rid your computer of these pop ups then you are able to operate your computer at full speed. This applies to you as well.

Posted by Blast  on Thursday, 03 June 2004 @ 08:21:55 EDT (157 reads)
(» Read More... | 7362 bytes more | TrackBack (0) | comments? | Featured Commentary | Score: 5)
image

image News by the Boss!: Lions and Tigers and Bears, Oh My! image
Trojans

Lions and Tigers and Bears, Oh My! - Part1












by Robin Laudanski, AKA IACOJ
June 2, 2004


Most of us probably remember those timeless words from the Wizard of Oz. Life ran at a slower pace then. Computers were the size of Semi-trailers and only the government or the most advanced corporations had them. There was little thought given to the need of security on the net, because there was no public Internet. In point of fact little consideration was given to security, until it became painfully apparent there was a problem. There is no doubt we aren't in Kansas anymore: Lions and Tigers and Bears have been replaced by Trojans and Viruses and Worms... Oh My!
Posted by IACOJ  on Wednesday, 02 June 2004 @ 16:22:34 EDT (163 reads)
(» Read More... | 6712 bytes more | TrackBack (0) | 4 comments | News by the Boss! | Score: 4.33)
image

image Threat Assessment: Linksys Router External Sniffing? image
Networks
I read a report today from The Inquirer that purports Linksys (now owned by Cisco) hasn't updated their firmware to popular products such as the BEFSR41 for a year now. The article was published today based on an exploit released by Jon Hart that claims via BOOTP can be used to crash or sniff Linksys devices remotely.
Posted by Paul  on Wednesday, 02 June 2004 @ 10:27:15 EDT (164 reads)
(» Read More... | 1048 bytes more | TrackBack (0) | 2 comments | Threat Assessment | Score: 0)
image

image Child Rights: Internet Crimes Against Children Exploding image
CyberCrime
Anonymous writes " Internet Crimes Against Children Exploding

Crime against children on the internet is growing fast; and yet, the problem is going largely unnoticed and underreported. Current statistics show that one in five children who use the Internet receive unwanted sexual solicitations. That might not seem like much stated that way, but, its more than five million children. And while it is easy to dismiss this as a simple reality of the Internet it fails to knock home the more important reality that if a child is exposed to behavior they are not ready to handle it could have an overall negative impact on their entire life. This is the real issue.

Another sinister aspect of the Internet is the explosion of pornography being directed at children. When most adult’s think of pornography they think of nudie pictures they might have gotten their hands on as a teenager. Certainly innocent and hardly damaging. But often on the Internet we are talking kiddy porn. Frankly I have yet to meet a person who has seen a real example of kiddy porn. I am sad to admit, however, that I saw my first kiddy porn picture at a law enforcement conference I attended. The picture was so shocking (a three year old) that it would be impossible for me to describe my own reaction adequately. Let’s just say the hair on the back of my head stood up. How big is the problem? Big enough that the second largest operation of the FBI is its “Innocent Images” program; it’s second only to the terrorism operation. The program is a first step to reduce or eliminate the distribution of kiddy porn on the internet. "
Posted by Paul  on Tuesday, 01 June 2004 @ 12:30:52 EDT (134 reads)
(» Read More... | 4005 bytes more | TrackBack (0) | comments? | Child Rights | Score: 5)
image

image Beware!: WhenU's Security Hole image
Hassle
"Abstract: In some WhenU software, including software still available on WhenU's ordinary public web site as recently as May 2004, a flaw in WhenU's self-updating feature allows an attacker to install software on users' computers, via methods such as spoofing a DNS response or hijacking a TCP download. Using these methods, attackers can obtain full control over PCs running the affected WhenU software -- allowing the installation of any software the attackers choose. "
Posted by Paul  on Tuesday, 01 June 2004 @ 00:13:33 EDT (119 reads)
(» Read More... | 546 bytes more | TrackBack (0) | comments? | Beware! | Score: 0)
image

image FIRST 64 BIT VIRUS ! image
Viruses
TMOV writes "SEE THE STORY AT THE REG.UK.CO

http://www.theregister.co.uk/2004/05/28/itanic_virus/
TMOV"


Note: Yes it appears that the first IA64 specific worm has been created for proof-of-concept that successfully attacks Windows executables. Although they say it is a proof of concept, one never knows when the first one will be released into the wild.
Posted by Paul  on Monday, 31 May 2004 @ 23:31:32 EDT (96 reads)
(TrackBack (0) | comments? | Score: 5)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication