The (In)security of Social Networking Sites

With the advent of Web 2.0, social networking sites with all their wonderful interactive capabilities have become extremely popular.  MySpace, Facebook, LinkedIn and others have enjoyed great popularity as they offer unique opportunities for collaboration and information sharing. ...

Red Hat Servers Hacked

On Friday, August 22, Red Hat announced on its web site that one or more of the servers used as part of the Fedora project had been compromised by hackers.  Even more troubling is the fact that the compromised servers included one that was used to signed Fedora packages.  Company...

The Dangers of Peer 2 Peer Software

It seems people still don’t get it.  Those nifty little peer 2 peer (P2P) applications that allow you to download free music also allow others to download music or any other type of file from your machine.  This includes files containing sensitive information such as SSNs, bank...

Phishing Scammers Targeting Delivery Service Companies

Lately, a large number of malicious spam emails have been sent to mailboxes pretending to be from Federal Express and other parcel delivery companies. The email attempts to get the user to open an attached ZIP file which contains a Trojan that infects the end user’s computer. In a...

The Evolution of Malware and the Underground Economy

When I first started working in the information technology profession back in the early 1990’s, there was not really a defined field specifically for security professionals.  Network and system security was handled by the system and network administrators responsible for the...