Site Network: | | Jongsma & Jongsma

Innovation in Information Security

Coverage of important Information Security and Information Technology news and events from the research team at S?nnet Beskerming.

Username: | Password: Contact us to request an account

Commentary & Insight From S?nnet Beskerming

Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.

Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.

All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.

Available entries
Time To Check For The Reds Under Your Bed
Posted in: Information Security
Reporting on a recent set of compromises to US military systems in Afghanistan has identified different attackers, depending on who you listen to.

On the one hand we have the attacks being tenuously linked to attackers based in Russia, and on the other we have the attacks being tenuously linked t....
Posted: 29 November 2008 17:18

How to Survive the Economic Downturn (Discounts for All!)
Posted in: Information Security
Much has been written about the ongoing financial crisis that is gripping the world, from Wall Street and Main Street, to High Street and your street. Your company might be finding it more difficult to attract external funding, you might be finding it difficult to attract new customers or to retain....
Posted: 28 November 2008 20:03

MS08-067 Attacks Arrive En-Masse
Posted in: Information Security
It has taken just on a month for the first real significant level of attacks against Microsoft's Critical out-of-cycle patch (MS08-067) to arrive. Microsoft's Malware Protection Center and many security companies are busily spreading word about the increase in attacks.

It is possible that the pr....
Posted: 27 November 2008 23:18

Stealing Domains via GMail
Posted in: Information Security
Using GMail to manage your domain administration can be risky, as some security researchers have found out in the past, but it seems that this lesson is a painful one that plenty of other website owners are finding out, first hand.

Despite the understandable panic and fear being expressed by some....
Posted: 23 November 2008 15:14

High Profile System Attacks Attract Attention
Posted in: Information Security
Attacks against high profile targets are nothing new, especially if the target is a government agency or the military. Due to the frequency of attack and the porosity of many networks, a compromise is rarely news. When three hospitals in London were recently affected by malware, it rapidly gained ....
Posted: 22 November 2008 21:38

Live OneCare is Dead, Long Live Live OneCare (and Morro)
Posted in: Information Security
Microsoft is set to cancel the fee based Live OneCare for consumers from mid-2009, replacing it with a free product, currently named Morro. In a seemingly user-aware move, Microsoft have acknowledged that the clear majority of users in both developed and developing markets that do not maintain curr....
Posted: 22 November 2008 21:26

Is Thanksgiving Week Really the Peak for System Infection?
Posted in: Information Security
Why would a security tools firm make the claim that three days before Thanksgiving is the busiest day of the year for malware attacks?

According to the Guardian, PC Tools are claiming just that, and they are claiming that this coming Monday, 24 November, will be the busiest day this year for com....
Posted: 19 November 2008 00:56

Watching Malware Evolve
Posted in: Information Security
Didier Stevens has posted an interesting insight into the evolution of a single piece of PDF malware. In the sample files that he analysed, Didier was able to identify that the author had passed through five incremental updates before reaching the point where the payload executed reliably and was r....
Posted: 18 November 2008 23:39

A Compromise Network Leads to Military Exercise Failure
Posted in: Information Security
An interesting claim has been made about the extent to which a compromised computer network was able to lead to failure of a military exercise for a Chinese Armour Brigade.

The claim is that a virus had compromised an unpatched system and was able to interrupt supply orders being passed across th....
Posted: 18 November 2008 23:20

When Joke Emails Turn Real
Posted in: Information Security
In the cyclical world of chain emails one of the earliest staples was an email claiming that Microsoft were able to track emails being sent and Bill Gates will pay you for each and every person who you forwarded the particular message to.

In May of this year, Microsoft launched their Live Search ....
Posted: 9 November 2008 19:04

Microsoft Issues Security Report for Jan-Jun 2008
Posted in: Information Security
Microsoft's Malware Protection Centre has released Volume 5 of their Security Intelligence Report (SIR), covering January to June 2008. While it may not have the independence of reporting from OWASP, ISC, US-CERT, or a number of other bodies, coming from the largest operating system and software ve....
Posted: 7 November 2008 15:43

Microsoft's November Patch Release Advance Notice
Posted in: Information Security
Last month Microsoft issued 11 patches with their monthly update as well as a Critical out of cycle Update for the RPC Service. Given the ease by which the RPC vulnerability could be targeted on many systems, it led many to fear that another Blaster or Sasser was on its way. Despite the availabili....
Posted: 7 November 2008 14:19

Old Malware Tricks Still Work
Posted in: Information Security
When Didier Stevens stumbled across a zero-byte padded piece of malware a year ago he was somewhat surprised to see that many antivirus systems tested against it failed to identify the underlying malware despite the targeted application (Internet Explorer) being quite happy to strip the 0x00 content....
Posted: 7 November 2008 13:43

Google Provides Details on how it Determines Unsafe Sites
Posted in: Information Security
A recent post at the Google Online Security Blog provides some background on how Google generates the "This site may harm your computer" warnings that appear from time to time in Google searches. It all boils down to automated scanners detecting the presence of malicious content. The article ident....
Posted: 2 November 2008 22:18

20th Anniversary for Poorly Written Network Worms
Posted in: Information Security
20 years of poorly written havoc-causing network worms will come to pass on November 2, as it marks the 20th anniversary of the Morris Worm, considered the first major network attack on the Internet. Despite only reaching an estimated 6,000 systems, it still represents 10% of the available systems ....
Posted: 2 November 2008 22:15

Posts from April, 2024.