Brian Prince

Researcher Unmasks Sneaky Clampi Trojan at Black Hat

A security researcher has uncovered new details on the malware behind one of the largest ongoing cyber-crime operations on the Internet. Known alternatively as the Clampi, Ligats or Ilomo Trojan, the malware is believed to have been infecting computers since 2007. Today, it is believed to have swiped data from hundreds of thousands of Windows […]

IBM Buys Ounce Labs, Could Challenge HP

IBM has acquired Ounce Labs to bolster its application testing abilities. The move underscores the demand for vulnerability testing, which analysts say has continued to grow even in the face of an economic downturn. According to Gartner, the market for both dynamic and static testing has grown steadily during the past few years and now […]

A Day in the Life of the Rustock Botnet

A Day in the Life of the Rustock Botnet by Brian Prince Evolution of Rustock This is a picture of the early evolution of the Rustock backdoor Trojan. Totmau is a Trojan Symantec found a few months before Rustock was discovered. Researchers there suspect the malware authors may be the same or connected, but that […]

Will Google Chrome OS Security Be Tough Enough?

Will Google Chrome OS Security Be Tough Enough? by Brian Prince Locking Down the OS Given that the focus is on supporting cloud applications, this should come naturally. By turning Google Chrome OS into a “toaster” and running primarily—if not only—Web apps like Google Docs and Picasa, Google can substantially reduce the attack surface, noted […]

Oracle Adds Database In-Memory Caching Option

Oracle has announced the release of Oracle TimesTen In-Memory Database 11g as well as a new database caching option in a nod toward the middle tier. The TimesTen In-Memory Database is a stand-alone in-memory relational database with full persistence and recoverability. With the caching option, Oracle is looking to improve application performance by caching data […]

Microsoft Rushes Out Visual Studio, IE Fixes

Microsoft made good on its promise to deliver two out-of-band security bulletins July 28 that cover vulnerabilities in Internet Explorer and Visual Studio. All told, the bulletins cover six bugs in IE and Visual Studio. MS09-035, the Visual Studio bulletin, provides an updated copy of the ATL (Active Template Library) that swats three bugs in […]

Conficker Mystery to Continue at Black Hat Conference

For all that has been written and said about the notorious Conficker worm, much remains unknown to the public. Who was behind it? What was their motive? Unfortunately, those mysteries will not be unraveled this week at the Black Hat security conference, when F-Secure Chief Research Officer Mikko Hypponen gives his presentation on the worm. […]

Apple iPhone 3GS Security Holes Revealed in YouTube Videos

A security researcher who has asserted Apple’s iPhone 3GS is not enterprise-ready has posted tutorials on YouTube to back up his claims. Jonathan Zdziarski, who teaches forensic classes about recovering data from the iPhone, has posted two tutorials to YouTube to demonstrate issues he contends are serious enough to make IT pros leave the iPhone […]

ATandT Lifts 4chan Block, Denies Censorship

AT&T blocked portions of the 4chan.org bulletin board July 25 and 26 in response to denial-of-service attacks against an AT&T customer, touching off a debate on censorship and network neutrality. In response to criticism, AT&T stressed that it moved against 4chan.org because of the attack, and not because of content posted there. Click here to […]

The Business of Botnets

Kaspersky Lab released some interesting statistics recently in a technical whitepaper. As part of its research into the cyber-underground, the company took a look at how botmasters are pricing the networks under their control. The prices cover a fairly large range, and depend on both what buyers are interested in and what they plan to […]