• Subscribe to the low volume list for updates.


UN and other high profile web sites compromised

More attacks on high profile web sites. It is clear from this article that the attackers found the victim sites by scanning servers and pouncing on the found vulnerabilities. The compromised servers were then used to serve up malicious code to build a botnet. It is highly likely regular vulnerability analysis would have saved these […]
Read More

Mpack Author Interview

This article over at SecurityFocus has some eye opening comments from the authors of the Mpack exploitation kit. The increasing popularity of compromised websites being used as an exploitation platform against end users is becoming a worrying trend. There are a couple of tongue in cheek comments like these - Do you feel sorry for […]
Read More

Stopbadware.org – Security Tips

There is some good information to be found at Stopbadware.org on securing a web site and ongoing efforts to eliminate the threat of malware being served up by compromised hosts and rogue web hosting companies. Basic security tips and tricks 5 steps to make your site more secure: Use strong passwords. Use SSH and SFTP […]
Read More

Network Computing | Vulnerability Assessment Scanners

The first paragraph of this Network Computing Feature should be a wake up call for anyone on the internet who does not take security of their servers seriously. Following on from the first alarming paragraph is a lengthy 9 page feature on various vulnerability scanners. The article clearly demonstrates that while vulnerability assessment is not […]
Read More

The June07 Mpack attack

On 18th of June a large scale attack was uncovered at an Italian based Web Hosting company. Websense reported that over 10'000 sites were compromised and used to serve malware to unsuspecting end users. SANS Internet Storm Center had some good analysis of the Mpack exploit package that was used with a follow up story […]
Read More