Brandon

Members
  • Content Count

    550
  • Joined

  • Last visited

Posts posted by Brandon

  1. Thank you everyone for your replys :)

    shanenin,

    I will try what you said after I can speak with Dell like blim suggested I try :thumbsup: thanks.

    blim,

    Hi blim..I will call them soon and also I will look on there site to see if I can find anything there first.

    martymas,

    I don't see anything like that, but I could be wrong.

    Any more suggestions are still welcomed.

  2. CLEARWATER, Fla.--(BUSINESS WIRE)--March 27, 2006--CastleCops, a globally oriented security and privacy site, and Sunbelt Software, a leading provider of Windows security software, announced today a new anti-phishing task force designed to help consumers and businesses combat the unending scourge of phishing scams and online identity theft.

    The task force, called the Phishing Incident Reporting and Termination (PIRT) Squad, is a community at CastleCops solely dedicated to taking down phishing sites. The community consists of members who report new phishing scams as well as highly experienced security researchers ("handlers") that handle incoming reports of phishing websites and are responsible for performing immediate action to terminate the criminal activity.

    The PIRT Squad works as a complement to existing organizations such as the Anti-Phishing Working Group (APWG). The primary difference between PIRT and other organizations is that PIRT is focused solely on aggressively terminating phishing sites. PIRT will work with other security organizations and, if necessary, law enforcement, to provide information for security and forensic analysis.

    "The reason this group was formed is to give consumers direct access to a dedicated task force that will take immediate and aggressive action to shutting down phishing sites," said Paul Laudanski, president of CastleCops.

    "While there is a very active professional security community performing outstanding research and forensics on phishing sites, it's our experience that many of these phishing sites themselves aren't immediately reported to the ISP, or in the case of compromised sites, to the domain owner. This effort adds one more layer to the fight against phishing, making it increasingly more difficult for the criminals to perpetrate their scams on innocent users," said Alex Eckelberry, president of Sunbelt Software.

    What types of sites host phishing scams?

    Most phishing sites are run on innocent websites that have been compromised. Others are run on servers at legitimate web hosting or freehosting sites. In some cases, phishing sites are run on servers managed by questionable ISPs.

    Isn't it impossible to get many of these sites shut down?

    Getting sites shut down is not impossible. However, it can be challenging, and in many cases, requires a deft combination of science and art, especially when a site is hosted in Eastern European or Asian countries. Based on its research, PIRT estimates that the success rate in shutting down a phishing site will be between 40%-50% of the sites identified. However, this number is expected to increase as the organization matures.

    How will PIRT get phishing sites shut down?

    PIRT Handlers will use all available avenues to rapidly shut down phishing sites. These include working with domain owners who have been compromised, contacting ISPs and, if necessary, working with law enforcement.

    How are Handlers trained?

    Handlers are trained by other CastleCops handlers in how to identify and shutdown phishing sites.

    Are PIRT members paid?

    PIRT is run completely by volunteers.

    How does someone report a phish to PIRT?

    Users can go to http://www.castlecops.com/pirt to submit a phish through a web-based system, or by email to [email protected].

    How do people learn more or become members of the PIRT squad?

    Go to http://wiki.castlecops.com/PIRT. We encourage as many people as possible to join.

    Full Article Here

  3. By Gregg Keizer, TechWeb News

    Botnet controllers may be planning a large-scale attack against message forums, TechWeb has learned.

    The SANS Institute's Internet Storm Center (ISC) noted that a bot going by the name "FuntKlakow" has registered on thousands of phpBB forums. Speculating, ISC analyst Marcus Sachs noted that the bot's owner(s) may be preparing to exploit a zero-day vulnerability against the popular php bulletin board software.

    "We might be chasing a ghost here but it's always good to be on the lookout for something like this," wrote Sachs in an alert on the ISC site Sunday.

    Sachs linked to the original posting about the attack possibility. That posting added that on most boards the FuntKlakow bot had only registered, but that it was capable of posting messages.

    A Google search for "FuntKlakow" suggested that the bot may have created accounts on more than 36,000 forums. Some of the forums show messages such as "Oh, how nice" and "Wow, I didn't think of that."

    "Next time the phpBB announces a critical vulnerability, the bot would have everything ready (just a post click away) from attacking thousands of sites/forums," the original post read.

    U.K.-based security and Web measurement company Netcraft added in a Monday alert that the phpBB software has been hit with several security problems, including a January hack of Advanced Micro Devices' (AMD) php-driven support forums that planted malicious code on visitors' machines.

    Full Article here.

  4. I'm giving this the OK to post, as it seems to be of good intent, and people seem to have an interest in it. Just remember, excessive spam is against forum policies

    Yah..this post is A-OK!

    We all know Brandon very well and know that this isn't commercial spamming, and definately is a very useful informative site it seems.

    Anyone who takes the time to seriously fight the excessive malware out there thru site like these, deserve to be recognized and helped as much as possible, so this post stays open.

    Thanks Chappy :)

  5. And they need malware expert folks who speak languages other than English, particularly Spanish.

    We are still working on different languages but its hard getting people to help out who are spanish in particular. We currently only have one Spanish mod right now I believe but the forum isnt ready yet.

  6. Brandon,

    Are you the Brandon in A2 Forums as well to?

    anywy, this sounds like more work for everyone that deal in HJT....... ooohhhhh do these people make more work for us?

    Hi Tony,

    Yes I am the Brandon from a2 forums :)

    Not that much really, it is just hearing what people have to say about a certain infection they had and reporting it. The hijack this people will just post the infection into a new topic for that country etc..

    HERE says that no hijack this logs can be posted.

    Hope I answered your question :wacko:

  7. Oooh, that sounds good, Brandon! I had to reformat a computer due to malware cooties--296 of 'em to be exact-- and that is a job that I (and the people here that I pestered to death with my dumb questions) never, ever want to do again. I'm checking it out. :thumbsup:

    Thanks!

    Liz

    Hi blim,

    Be sure to post in the forum about your experiences with malware :)

  8. For years now . . .

    . . . Users of the Internet are being plagued by websites and programs which try to

    • hijack their computer,
    • trick them into making high (dialing-)expenses,
    • very aggressively steal passwords and banking information, and
    • influence their surfing habits.

    Such actions are an attempt to trick people into purchasing programs which do not work properly or not at all, can harm the affected computer, or just attempt to damage or destroy the operating system, security-programs and/or other programs.

    Of course, we are talking about Viruses, Trojans, Spyware, Hijackers, Dialers, Adware and fake (malware-scanning) programs -- or Malware, in short.

    Until now, people who fell victim to malware, could not do much more than try to remove it from the computer -- at times spending a lot of money to get the computer in working order again.

    But that can change now!

    What is Malware Complaints?

    Simply put, Malware Complaints is a website forum. However, for more than one reason, it is a unique forum.

    Malware Complaints is a cooperation between many anti-malware helpers and experts from all over the world. From all corners of the world, these people have joined together to make it possible for users, from whatever part of the world they come, to make their complaint against malware and the makers of it.

    Malware Complaints offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

    Instead of only removing the malware (or let it be removed) and wait for the next infection, users can really stand up against the makers of malware!

    What will Malware Complaints do with the complaints, which users post?

    Malware Complaints collects the complaints and stories, by country/region as well as by malware-group or -family, that way creating the possibility to:

    • issue petitions, which can be offered to governments and official bureaus that deal with internet security, thus making it clear to those officials how extensive the problems with malware have evolved;
    • make malware-issues known to the news media, which, in turn, can make malware and their makers known to the world.

    Why should victims tell their story?

    Malware Complaints is doing something that malware and malware-makers absolutely do not want.

    The goal of Malware Complaints is to bring malware(-makers) into the open. This exposure to the public and government officials will make it much harder for them to operate.

    When malware is described by the press and rejected by politicians and/or official organizations, it can even become possible to outlaw malware and it will then be possible, for everyone, to take legal action against malware-makers.

    This is the place to tell your story -> MalwareComplaints.gif <- where you can make a difference!

    ________________

    Inspiration Sources

    Fight Back Against SpyAxe

    Spyware warriors call for action

    Fighting back and Making a Difference

    This document is the joint effort of jahewi and Corrine.

  9. Experts at SophosLabsâ„¢, Sophos's global network of virus, spyware and spam analysis centers, have issued protection against a second worm for Mac OS X. The OSX/Inqtana-A worm spreads between Apple Macintosh computers via a Bluetooth vulnerability. The new worm has appeared within days of the discovery of the first ever real virus for Mac OS X.

    The Inqtana worm exploits a vulnerability (known as CAN-2005-1333) to spread itself to other vulnerable Mac OS X computers. However, Apple released a patch against the vulnerability in mid 2005, meaning the worm is highly unlikely to spread successfully.

    Users of Mac OS X are advised to keep their software updated against the latest security vulnerabilities in Apple's code.

    "It's disturbing to see a second worm for Mac OS X so soon after the first, but it should be remembered that this is only two compared to well over 100,000 viruses for Microsoft operating systems," said Graham Cluley, senior technology consultant for Sophos. "The good news is that Inqtana is not going to spread successfully in the wild, but this announcement will still be a shock to those in the Mac community who thought hackers were not interested in their operating system."

    http://www.sophos.com/pressoffice/news/art...02/inqtana.html

  10. OSX/Leap-A worm spreads via iChat instant messaging software

    Experts at SophosLabsâ„¢, Sophos's global network of virus, spyware and spam analysis centers, have announced the discovery of the first virus for the Apple Mac OS X platform. The virus, named OSX/Leap-A (also known as OSX/Oompa-A) spreads via instant messaging systems.

    The OSX/Leap-A worm spreads via the iChat instant messaging system, forwarding itself as a file called latestpics.tgz to contacts on the infected users' buddy list. When the latestpics.tgz archive file is opened on a computer it disguises its contents with a JPEG graphic icon in an attempt to fool people into thinking it is harmless.

    The worm uses the text "oompa" as an infection marker in the resource forks of infected programs to prevent it from reinfecting the same files.

    "Some owners of Mac computers have held the belief that Mac OS X is incapable of harboring computer viruses, but Leap-A will leave them shellshocked, as it shows that the malware threat on Mac OS X is real," said Graham Cluley, senior technology consultant for Sophos. "Mac users shouldn't think it's okay to lie back and not worry about viruses."

    http://www.sophos.com/pressoffice/news/art...macosxleap.html

  11. Corrine welcome to BestTechie :)

    If you dont know Corrine, she is an Microsoft MVP and an ASAP member. She is also a very nice person to others and is well repected by many people across the web ^_^ Im glad you decided to join up at BestTechie :) Welcome.

  12. June 30, 2006 will bring a close to Extended Support for Windows 98, Windows 98 Second Edition, and Windows Me as part of the Microsoft Lifecycle Policy. Microsoft will retire public and technical support, including security updates, by this date.

    Existing support documents and content, however, will continue to be available through the Microsoft Support Product Solution Center Web site. This Web site will continue to host a wealth of previous How-to, Troubleshooting, and Configuration content for anyone who may need self-service.

    Microsoft is retiring support for these products because they are outdated and can expose customers to security risks. We recommend that customers who are still running Windows 98 or Windows Me upgrade to a newer, more secure Microsoft operating system, such as Windows XP, as soon as possible.

    Customers who upgrade to Windows XP report improved security, richer functionality, and increased productivity.

    Need to upgrade your software?

    Learn how to upgrade to Windows XP Professional

    http://www.microsoft.com/windows/support/endofsupport.mspx