Top Six Database Attacks

Thursday, May 8th, 2008

It takes the average attacker less than 10 seconds to hack in and out of a database -- hardly enough time for the database administrator even notice the intruder. So it’s no surprise that many database attacks go unnoticed by organizations until long after the data has been compromised. And surprisingly, ...

SQL Injection Worm on the Loose

Wednesday, May 7th, 2008

A loyal ISC reader, Rob, wrote in to point us at what looks to be a SQL Injection worm that is on the loose.  From a quick google search it shows that there are about 4,000 websites infected and that this worm started at least mid-April if not earlier.  Right ...

Trojan Adware Hiding in MP3s, McAfee Says

Tuesday, May 6th, 2008

Adware pushers have found a new way to trick you into downloading their annoying products: fake MP3 files. On Tuesday, security vendor McAfee reported that it's seen a huge spike in fake MP3 files spreading on peer-to-peer networks. Although the files have names that make them look like audio recordings, they're ...

Who Killed My Hard Drive?

Tuesday, May 6th, 2008

You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage? A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they ...

Sandman – Read the Windows Hibernation File

Monday, May 5th, 2008

This is a pretty new tool and a very cool one, Hibernation is a fairly new feature for Windows so it’s good to see a new tool targeting that. Microsoft provides a feature called Hibernation also know as suspend to disk that aims to save the system state into an undocumented ...