New Zealand teenager convicted over international cyber crime ring

,----[ Quote ]
| Owen Thor Walker, 18, known by his online name "AKILL," was involved in a
| network accused of infiltrating 1.3 million computers and skimming millions
| of dollars from victims' bank accounts.

Internet has a garbage problem, researcher says

,----[ Quote ]
| Somewhere between 1 percent and 3 percent of all traffic on the Internet is
| meaningless packets of information, used in distributed denial of service
| attacks (DDOS) to knock Web sites offline.

That's an artificial boost for IE/Win32 in Web 'stats' (as in lies and damn


No April Fools'--Storm worm is back

,----[ Quote ]
| The compromised computer will then install the downloaded file as C:
| \WINDOWS\aromis.exe. Nazario reports that the botnet file opens the firewall
| using the netsh firewall set command, makes a lot of outbound connections,
| then listens on a random UDP port. *

Last week:

With Vista breached, Linux unbeaten in hacking contest

,----[ Quote ]
| The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on
| the last day of the contest; but it was Linux, running on a Sony Vaio, that
| remained undefeated as conference organizers ended a three-way computer
| hacking challenge Friday at the CanSecWest conference. *


What spooks Microsoft's chief security advisor

,----[ Quote ]
| Speaking at the Boston SecureWorld conference Wednesday, the 19-year
| Microsoft veteran whose job includes protecting enterprises, developers and
| Microsoft itself said there actually is plenty of good news on the security
| front. For example, his outfit scans a half million devices (with customer
| permission) per month and in the first half of last year saw the first
| period-over-period decline in new vulnerabilities disclosed across Microsoft
| and non-Microsoft software since 2003.
| However, 3,400 new vulnerabilities were discovered and “it’s still a big
| number,” Arsenault says. “So if vulnerability rates are down, where are
| they?”

Websense Security Labs first to discover vulnerability within Microsoft Office

,----[ Quote ]
| This vulnerability allows code execution within an Excel document without the
| knowledge of the user.

Bots rule in cyberspace

,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.