Phishing & BotNets Mode:
(Page 2 of 8)  < Prev  1 2 3 4 5 6 7  Next >
Getting access to fresh phishing/spam(/email malware) emails? 2007-02-16
phish_n_bots dusty ece cmu edu (1 replies)
It's quite interesting that the phishing list is combined with the botnets list. I am currently doing research on botnet network traffic and I am wondering if
anyone has spam/phishing taps which they could give me access to. Specifically I'm trying to correlate the behavior of bots which send spam/

[ more ]  [ reply ]
RE: Getting access to fresh phishing/spam(/email malware) emails? 2007-02-16
dave kleiman (dave davekleiman com)
What else to be done ? 2007-02-14
dubaisans dubai (dubaisans gmail com) (2 replies)
Apart from two-factor and user awareness is there anything meaningful
we can do against phishing ?

Is it time to stop paying anti-phishing vendors who do domain-name
search , who have spam traps etc ?

There are many vendors providing take down services - pay-per-use and
also bulk - do these make s

[ more ]  [ reply ]
Re: What else to be done ? 2007-02-16
Carl Jongsma (info skiifwrald com) (1 replies)
RE: What else to be done ? 2007-02-20
Anoop Mangla (anoop mangla paladion net) (1 replies)
Re: What else to be done ? 2007-02-21
Carl Jongsma (info skiifwrald com)
Re: What else to be done ? 2007-02-15
Isaac Perez (suscripcions tsolucio com)
Re: [phishing] Fwd: FW: Experience a new way of banking. 2007-02-01
bf (illuminatus master gmail com)
For those that caught the URL flop, sorry, my coffee hadn't started working yet.

I've asked for the headers as the email was forwarded to me, we'll see.

Still an interesting approach on the attack, whatever the case I'm
going to run it through Paros for laughs and see what I get.

On 2/1/07, h.

[ more ]  [ reply ]
Fwd: FW: Experience a new way of banking. 2007-02-01
bf (illuminatus master gmail com)
Good Morning List,
The Phish below has an interesting twist in that it offers
registration for a new authentication system.

Details:
Phish URL: https://business-eb.ibanking-services.com/K1/sb_login.jsp

Pinging business-eb.ibanking-services.com [64.132.202.28]:

IP address: 64

[ more ]  [ reply ]
Phishing Evolution Report Released 2007-01-31
Carl Jongsma (info skiifwrald com)
Hello List(s),

For those interested in the original FD/SF phishing email about a new
phishing technique being employed on a professional networking site
(late last week), the investigation and subsequent report have been
published. Readers of 'The Register' will note a write up already in

[ more ]  [ reply ]
A Recent Phishing Evolution? 2007-01-25
Carl Jongsma (info skiifwrald com)
Hello List(s),

An interesting evolution in the use of professional and social
networking sites as a means to build trust between a spammer /
phisher and their target seems to have recently (within the last
week) taken place on at least one professional networking site (which
shall go unname

[ more ]  [ reply ]
Re: explaining phishing to a naive user 2007-01-25
Ian (cobalt-users1 fishnet co uk)
On 23 Jan 2007 at 23:43, Saeed Abu Nimeh wrote:

> Hi All,
> If I want to explain email phishing to set of user (novice,
> intermediate, and experts), can I summarize --let us say-- a list of 100
> questions that a user answers gradually to find if this email is
> phishing or not? Examples of questi

[ more ]  [ reply ]
RE: explaining phishing to a naive user 2007-01-24
Mark Hofman (mhofman shearwater com au) (1 replies)
Seed,

There is a fairly easy question that will identify almost 100% of all
phising emails.

Does the email ask you to click a link to provide your personal details
such as login details or credit card details (you could ask a few more
things here) . You can further qualify it by saying did you

[ more ]  [ reply ]
RE: explaining phishing to a naive user 2007-01-27
Paul, Sandeep (spaul ipolicynetworks com)
explaining phishing to a naive user 2007-01-24
Saeed Abu Nimeh (drellman hotmail com) (5 replies)
Hi All,
If I want to explain email phishing to set of user (novice,
intermediate, and experts), can I summarize --let us say-- a list of 100
questions that a user answers gradually to find if this email is
phishing or not? Examples of questions I can think of:
- does email contain html
- does email

[ more ]  [ reply ]
Re: explaining phishing to a naive user 2007-02-14
Lionel Ferette (lionel ferette belnet be)
Re: explaining phishing to a naive user 2007-02-11
Isaac Perez Moncho (suscripcions tsolucio com)
Re: explaining phishing to a naive user 2007-01-25
Ivan Markovic (ivanm net gmail com)
Re: explaining phishing to a naive user 2007-01-25
Carl Jongsma (info skiifwrald com)
Re: explaining phishing to a naive user 2007-01-25
Radu Oprisan (radu securesystems ro)
txdns 2.0.0: (free) Aggressive multithreaded DNS digger/brute-forcer 2006-11-16
Arley Barros Leal (arley leal sonae com)
Hi,

I'm very excited to release TXDNS 2.0.0 (www.txdns.net). This new
version features a distributed model which further boosts TXDNS's
parallelism and performance. This model allows a TXDNS client to send
jobs to a TXDNS server over a clear or encrypted TCP channel.

For example, to put a TXDNS h

[ more ]  [ reply ]
Re: Phishing Powerpoint Presentation & PIRT 2006-11-13
Paul Laudanski (paul castlecops com)
I've updated the slides today on the rock phish. 21 brands. Plus minor
updates elsewhere.

Same link to the ppt as before. Now also a PDF:

www.castlecops.com/zx/Paul/pirt.pdf.

Beware, the PDF is more than twice the size of the PPT coming in at 27 MB.

Paul Laudanski, Microsoft MVP Windows-Secu

[ more ]  [ reply ]
Fwd: Citibank e-mail looks phishy 2006-11-13
Saqib Ali (docbook xml gmail com)
---------- Forwarded message ----------
From: Cid Carlos <Carlos.Cid (at) rhul.ac (dot) uk [email concealed]>
Date: Nov 12, 2006 5:00 AM
Subject: Citibank e-mail looks phishy
To: cryptography (at) metzdowd (dot) com [email concealed]

Citibank e-mail looks phishy

http://www.zdnet.com.au/news/security/print.htm?TYPE=story&AT=339272126-

130061744t-11000000

[ more ]  [ reply ]
Phishing Powerpoint Presentation & PIRT 2006-11-06
Paul Laudanski (paul castlecops com)
There are just over 130 slides weighing in at 12MB. Its an aggregation of
slides from various presentations I've made over an approximate six week
period.

http://www.castlecops.com/article-6682-nested-0-0.html

Paul Laudanski, Microsoft MVP Windows-Security
Phish XML Feed: http://www.castlecops.

[ more ]  [ reply ]
IE 7 Address Vulnerability 2006-11-04
Paul Justin (pauljustin gmail com)
Good evening all,

I heard that the Windows Internet Explorer 7.0 has the vulnerability
where the user can be redirected to a phishing page without the URL
Address of the browser actually changing to reflect the different URL?

I don't really have much information and only caught wind of it
through

[ more ]  [ reply ]
Anti Phishing Tools 2006-11-03
david bizeul org
Hi all,

I have written Web pages that provide details on some home made security measures which can be used to address ID thefts or phishing attacks. Some of those measures could be useful in some cases depending the needs.

My aim is to offer some free stuff to help CISOs and IT staff increase th

[ more ]  [ reply ]
Re: spyware issue 2006-11-02
Nick Baronian (kvetch gmail com)
Thanks Eric. In examining some of the data it looks like one of my
mystery IP's is an IM Spam bot. Since it doesn't route within our
network it gets dropped but I don't understand why someone would do
this. I figure you would want the biggest bang for your buck so you
should utilize the system's

[ more ]  [ reply ]
spyware issue 2006-10-27
Nick Baronian (kvetch gmail com) (1 replies)
I had a machine on my network that had was infected with some viruses
and malware. The machine has been wiped and rebuilt but I noticed
going thru my IDS logs for that day I saw a couple IP's in my lan that
were not mine and they were routable. Do some forms of malware/bots
have a static addresses

[ more ]  [ reply ]
Re: spyware issue 2006-11-02
Eric F (eric f na gmail com)
Re: Virtual Keyboards 2006-10-21
Lance James (phishing securescience net)
Nelson Murilo wrote:
> Not in Brazil, where trojans know to using action mouse events to
> generate user credentials photos and movies, since 2004.

I meant to say ineffective!
>
> ./nelson -murilo
>
> On Thu, Oct 19, 2006 at 07:16:32PM -0700, Lance James wrote:
>> point being, ever since 2003,

[ more ]  [ reply ]
(Page 2 of 8)  < Prev  1 2 3 4 5 6 7  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus