General discussion

Locked

A Day In The Life Of An Information Security Investigator

By securitymonkey ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

149 total posts (Page 1 of 15)   01 | 02 | 03 | 04 | 05   Next
| Thread display: Collapse - | Expand +

All Comments

Collapse -

Stick It To The Banks: Bye-Bye Phishing!

by securitymonkey In reply to A Day In The Life Of An I ...

Recently a reader brought up the name Bruce Schneier, one of the foremost authorities on information security, so I thought I would share this great article from Wired. Bruce suggests that if financial institutions were liable for the aftermath of...<p><div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006052.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Security Consultant Convicted!

by securitymonkey In reply to A Day In The Life Of An I ...

I am periodically asked about the dangers involved with doing information security investigations. One item that is often overlooked in these discussions is the "John Wayne" mentality that some security consultants develop over time....<p><div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006058.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

What's Up With The Chief?

by securitymonkey In reply to A Day In The Life Of An I ...

A quick apology to all my loyal readers for the infrequency of postings, and the slow updates to case files. I've just been slammed for the past few months. I'm enjoying a short reprive at BlackHat Seattle right now, and...<p><div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006095.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Case Of The Audacious Attacker - Part VIII

by securitymonkey In reply to A Day In The Life Of An I ...

An uncomfortable laugh filled the phone line. I could hear Brian moving the phone away from his mouth to lessen the impact of his disbelief. "You've seen this 111.exe process before?" I asked....<div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006096.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Bot-net Creators Arrested

by securitymonkey In reply to A Day In The Life Of An I ...

Dutch police have arrested 3 men (aged 19,22, & 27) who alledgedly used the toxbot trojan to create a botnet of over 100000 machines. The trio conducted a DDOS attack against an unnamed US company in an extortion attempt, as...<p><div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006105.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Case Of The Audacious Attacker - Part IX

by securitymonkey In reply to A Day In The Life Of An I ...

"Chief, you really need to go back to your caffeinated ways man. How exactly does a list of words give somebody a motive to create and distribute this little worm?" Scrap said as he bit his lower lip. Not only...<div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006138.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Myspace.com Worm Author: "OOPS!"

by securitymonkey In reply to A Day In The Life Of An I ...

I was going to ramble on and on about the contents of this story on Beta News, but I think I'll let you all do the talking on this. Important points: 1) There is no such thing as a harmless...<p><div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006159.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Case Of The Audacious Attacker - Part X

by securitymonkey In reply to A Day In The Life Of An I ...

"Are you absolutely sure?" I asked Reese as she sat down with us in the back of the booth for a quick coffee break. "Yes, I'm sure. We never do anything on those kiosk machines but visit the demo site."...<div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006188.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Reading Email At Starbucks and Pwned!!!

by securitymonkey In reply to A Day In The Life Of An I ...

I hope that everyone saw this last year at DEFCON, but for those of you who did not ... AirPwn is a great little POSIX program (that means it only runs on *NIX boxes, y'all) that can do a complete...<div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006252.asp?rss=1">This post originally appeared on an external website</a></div>

Collapse -

Case Of The Audacious Attacker - Part XI

by securitymonkey In reply to A Day In The Life Of An I ...

The great thing about Starbucks locations (besides the wonderful coffee) is that they are everywhere. Scrap and I had decided to head back to our hotel room, and stopped at a "holy green-logo'd shrine to the coffee bean" on the...<div class="blogdisclaim"><a href="http://blogs.ittoolbox.com/security/investigator/archives/006257.asp?rss=1">This post originally appeared on an external website</a></div>

Back to After Hours Forum
149 total posts (Page 1 of 15)   01 | 02 | 03 | 04 | 05   Next

Related Discussions

Related Forums