«
Expand/Collapse
107 items tagged "spam"
Related tags:
vulnerabilities [+],
virus [+],
facebook [+],
whitepaper [+],
barracuda [+],
wordpress [+],
cms [+],
chaos communication congress [+],
wikkawiki [+],
usn [+],
day [+],
useragent header [+],
spam image [+],
spam filters [+],
peter eisentraut [+],
page [+],
new [+],
maxsite [+],
malware [+],
mail relay [+],
mail protocols [+],
logging feature [+],
levels [+],
least three different ways [+],
internet explorer [+],
india [+],
image [+],
firefox [+],
filter [+],
e mail service [+],
comment [+],
brute force [+],
block spam [+],
block [+],
automation [+],
authentication [+],
astaro [+],
suspected [+],
wp spamfree [+],
video [+],
usa [+],
unprecedented losses [+],
text [+],
stefan sels [+],
sql injection [+],
spam prevention [+],
sophos [+],
sels [+],
rihanna [+],
progress [+],
nobody [+],
meeting [+],
malicious [+],
laden [+],
kret [+],
joomla [+],
internet [+],
ico says [+],
homographs [+],
hand [+],
google [+],
global [+],
epidemic proportions [+],
epidemic [+],
dos [+],
domain registrars [+],
curtis kret [+],
community v3 [+],
case study [+],
bypassing [+],
bugtraq [+],
browser extensions [+],
boom [+],
black hat [+],
audio [+],
anonymous [+],
andrew fried [+],
analysis [+],
yahoo [+],
xss [+],
wouters [+],
world [+],
work [+],
windows security [+],
wave [+],
waf [+],
viruses [+],
virus bulletin [+],
virtual keyboard [+],
virgin mobile [+],
villains [+],
video converter [+],
viagra [+],
vendors [+],
utm [+],
users [+],
usa number [+],
twitter [+],
tripadvisor [+],
threat [+],
targeted [+],
tagcloud [+],
swoopo [+],
stock market [+],
stealing [+],
sql [+],
spamming [+],
spam scam [+],
spam mail [+],
something [+],
social networking [+],
social engineering [+],
snmp vulnerability [+],
snmp [+],
six [+],
site [+],
shop [+],
service vulnerability [+],
sends [+],
security researchers [+],
security gateway [+],
relay [+],
queen [+],
pushing [+],
popular [+],
plummet [+],
phishing [+],
paul wouters [+],
paper [+],
pandemic [+],
oryx [+],
org [+],
onslaught [+],
number [+],
nightmare [+],
nigerian nationals [+],
multiple buffer overflow [+],
multiple [+],
mobile [+],
misc [+],
michael jackson [+],
michael [+],
mcafee [+],
logging [+],
linux [+],
linkedin [+],
link [+],
kind [+],
kernel regression [+],
k meleon [+],
jackson still [+],
ipv [+],
iphone [+],
invitations [+],
intro [+],
infections [+],
india world [+],
inbox [+],
home [+],
hits [+],
historic [+],
hijack [+],
havalite [+],
hacks [+],
grum [+],
grant jordan [+],
gold shop [+],
gnu c library [+],
gnu [+],
friends links [+],
floods [+],
flashfxp [+],
firewall [+],
fined [+],
filters [+],
file [+],
fake [+],
exploits [+],
evolution [+],
endian [+],
efront [+],
effectiveness [+],
edinburgh [+],
e mail [+],
duke of edinburgh [+],
duke [+],
dozen [+],
dirty dozen [+],
dirty [+],
directory traversal [+],
directory [+],
denial of service [+],
data breach [+],
culprit [+],
crown [+],
crashes [+],
covert channels [+],
covert channel [+],
comerciosonline [+],
chengdu [+],
chaos communication camp [+],
captcha busting [+],
capital [+],
cannon fires [+],
bureau [+],
buffer overflow vulnerability [+],
buffer overflow vulnerabilities [+],
branch [+],
botnet [+],
bart [+],
axigen [+],
app [+],
anvsoft [+],
anti [+],
anatomy [+],
amp v2 [+],
amp [+],
Community [+],
vulnerability [+]
-
-
17:00
»
SecuriTeam
Barracuda Spam & Virus WAF 600 is prone to multiple unspecified HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
-
-
21:55
»
SecDocs
Authors:
Stefan Sels Tags:
spam Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: SPAM is a growing problem that is hard to fight. On the one hand you want to communicate with everybody, on the other hand you don´t want to be filled up with SPAM. To fight spam effectifly there are some server and clientside solutions which help and put some mails into the trash by their own.
-
21:55
»
SecDocs
Authors:
Stefan Sels Tags:
spam Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: SPAM is a growing problem that is hard to fight. On the one hand you want to communicate with everybody, on the other hand you don´t want to be filled up with SPAM. To fight spam effectifly there are some server and clientside solutions which help and put some mails into the trash by their own.
-
-
12:35
»
SecDocs
Authors:
Peter Eisentraut Tags:
virus spam Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.
-
12:35
»
SecDocs
Authors:
Peter Eisentraut Tags:
virus spam Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.
-
-
21:37
»
SecDocs
Authors:
Peter Eisentraut Tags:
virus spam Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.
-
-
14:58
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in WikkaWiki. When the spam logging feature is enabled, it is possible to inject PHP code into the spam log file via the UserAgent header, and then request it to execute our payload. There are at least three different ways to trigger spam protection, this module does so by generating 10 fake URLs in a comment (by default, the max_new_comment_urls parameter is 6). Please note that in order to use the injection, you must manually pick a page first that allows you to add a comment, and then set it as 'PAGE'.
-
14:58
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in WikkaWiki. When the spam logging feature is enabled, it is possible to inject PHP code into the spam log file via the UserAgent header, and then request it to execute our payload. There are at least three different ways to trigger spam protection, this module does so by generating 10 fake URLs in a comment (by default, the max_new_comment_urls parameter is 6). Please note that in order to use the injection, you must manually pick a page first that allows you to add a comment, and then set it as 'PAGE'.
-
14:58
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in WikkaWiki. When the spam logging feature is enabled, it is possible to inject PHP code into the spam log file via the UserAgent header, and then request it to execute our payload. There are at least three different ways to trigger spam protection, this module does so by generating 10 fake URLs in a comment (by default, the max_new_comment_urls parameter is 6). Please note that in order to use the injection, you must manually pick a page first that allows you to add a comment, and then set it as 'PAGE'.
-
16:01
»
Hack a Day
While [Oryx] is down with social media like Facebook and Twitter, there are times when he wants to share things with people he is hanging out with in the real world. Sure, he could always email his friends links to the latest video of a cat doing something totally hilarious, but he wanted something a [...]
-
-
1:49
»
Sophos security news
Cybercriminals change their tactics as malware spreading, phishing emails and social networking attacks replace traditional spam characteristics.
-
-
21:05
»
SecDocs
Authors:
Andrew Fried Tags:
malware spam malware analysis Event:
Black Hat DC 2010 Abstract: Malware injecting emails and websites have reached epidemic proportions on the Internet. Virtually all spam originates from bot-infected systems, which have the capacity to send out millions of emails per hour. The sites hosting malware are often part of large fast flux botnets that are geographically dispersed and change with great frequency. The threats have gotten larger; they hit victims faster and have been causing unprecedented losses. Historically, the primary defense against these attacks has been the anti-virus program. Today, however, antivirus products no longer provide adequate protection – detection rates of less than 20% are commonly seen on newly discovered malware. The detection, suppression and mitigation of these threats require timely and coordinated efforts between security researchers, anti-virus/content filter vendors, realtime blackhole list maintainers and domain registrars/registries. This presentation will provide a rare glimpse "behind the curtain" of the efforts undertaken by security researchers (represented by Internet Systems Consortium), domain registrars (represented by GoDaddy) and realtime blackhole providers (represented by The Spamhaus Project and SURBL).
-
21:05
»
SecDocs
Authors:
Andrew Fried Tags:
malware spam malware analysis Event:
Black Hat DC 2010 Abstract: Malware injecting emails and websites have reached epidemic proportions on the Internet. Virtually all spam originates from bot-infected systems, which have the capacity to send out millions of emails per hour. The sites hosting malware are often part of large fast flux botnets that are geographically dispersed and change with great frequency. The threats have gotten larger; they hit victims faster and have been causing unprecedented losses. Historically, the primary defense against these attacks has been the anti-virus program. Today, however, antivirus products no longer provide adequate protection – detection rates of less than 20% are commonly seen on newly discovered malware. The detection, suppression and mitigation of these threats require timely and coordinated efforts between security researchers, anti-virus/content filter vendors, realtime blackhole list maintainers and domain registrars/registries. This presentation will provide a rare glimpse "behind the curtain" of the efforts undertaken by security researchers (represented by Internet Systems Consortium), domain registrars (represented by GoDaddy) and realtime blackhole providers (represented by The Spamhaus Project and SURBL).
-
-
6:00
»
darkc0de
How to remove this kind of spam in my inbox
-
-
15:00
»
Sophos security news
The Queen and Duke of Edinburgh to visit Sophos, leaders in protecting businesses against spam and viruses