Top 15 Malicious Spyware Actions

Sunday, April 6th, 2008

Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses. Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...

MySQL SQL Injection Cheat Sheet

Sunday, April 6th, 2008

Some useful syntax reminders for SQL Injection into MySQL databases... This post is part of a series of SQL Injection Cheat Sheets.  In this series, I've endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend.  This helps to ...

Phishing Revisited

Sunday, April 6th, 2008

As Chris mentioned in a previous post we used social engineering and phishing emails as an attack vector. The scope of the engagement prevented us from collecting any data that could be used to identify the user. The client was not out to make examples of their staff but to ...

Windows Vista Source Code Leaked!

Saturday, April 5th, 2008



Analysis of a Win32.Delf Variant

Friday, April 4th, 2008

We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...