19 February, 2004

The Penny Black Project - Outsmarting Spam

Microsoft has a plan in place to put spam into history: increase the cost of sending multiple messages. Currently, it costs the same to send a message to one or more persons. With new software, code-named Operation Penny Black, for every email sent the sender's computer would require to solve a complex math problem that takes 10 seconds. It wont be a problem for sending a few mails but spammers, who send millions of emails, will certainly be haeding for trouble.

Source: India Today (feb 23, 2004)

13 February, 2004

ZDNet India : Windows 2000 code posted on Net:

Microsoft is investigating how a file containing some protected source code to Windows 2000 was posted to several underground sites and chat rooms.

"The 203MB file contains code from Microsoft's enterprise operating system, but the code was clearly incomplete, said Dragos Ruiu, a security consultant and the organizer of the CanSecWest security conference, who has examined the file listing.'It was on the peer-to-peer networks and IRC (Internet relay chat) today,' Ruiu said. 'Everybody has got it; it's widespread now.'

The 203MB file expands to just under 660MB, he said, noting that the final code size almost perfectly matches the capacity of a typical CD-ROM. The entire source code, he said, is believed to be about 40GB, meaning that the file circulating Thursday is only a fraction of the full code base."

02 February, 2004

Virus strikes the Internet - Virus Ithihaas

LONDON (Reuters) - The MyDoom Internet worm claimed its first scalp on Sunday, paralysing the Web site of American software firm SCO Group with a massive data blitz.

SCO is not alone. Microsoft Corp has been targeted by a second variant of MyDoom, dubbed MyDoom.B. That attack is timed to kickoff on Tuesday.

MyDoom, the latest worm to infect computers over the Internet, is the fastest-spreading attack since last summer's twin attacks by the Blaster worm and SoBig virus, computer security experts said.

Following are brief descriptions of some of the major viruses, according to various security firms including TruSecure/ICSA Labs, Trend Micro, F-Secure Corp., Sophos, Network Associates Inc., and Symantec Corp.

-- In 1986, two brothers, Amjad and Basit Farooq Alvi, wrote what is thought to be the first PC virus to infect floppy disks. Dubbed the "Pakistani Brain" virus, it was designed to advertise their software company, Brain Computer Services in Lahore, Pakistan.

-- The first worm -- a virus that spreads through the Internet -- was released on November 2, 1988 by Cornell graduate student Robert Morris Jr. The "Morris Worm" exploited a flaw in the Unix operating system and spread within days to about 6,000 mainframes, or between five and 10 percent of the total on the Internet at the time. Morris, the son of a computer security expert at the U.S. National Security Agency, was convicted of violating the Computer Fraud and Abuse Act.

-- In 1989, a teenager in Sofia, Bulgaria, released the Dark Avenger virus that destroyed data and contained references to lyrics from metal rock band Iron Maiden, including "Eddy lives ... somewhere in time." He also wrote the first polymorphic virus, which changes characteristics to avoid detection.

-- Ching Ing-hau, a sergeant in the Taiwanese army, wrote the Chernobyl virus, also called CIH, in 1998. Set to activate on the anniversary of the Chernobyl nuclear disaster, April 26, it would try to erase the hard drive on an infected computer. Experts said he wrote it to get revenge on the anti-virus industry after the army got infected by a virus.

-- In 1999 David Smith of New Jersey wrote the Melissa virus that spread via e-mail and infected Microsoft Word documents. Smith had two aliases, "Vicodin" for his virus writing, and "Doug Winterspoon" for when he was posing as a legitimate virus expert, experts said. Smith did not go to prison for several years but is now serving time.

-- Filipino university student Onel de Guzman released the "IloveYou" or "LoveLetter" e-mail virus in 2000. It tricked people into opening an infected e-mail attachment and installed a keystroke logger so he could get access to passwords on infected machines.

-- Jan De Wit, from The Netherlands, wrote the Anna Kournikova virus in 2001 using the alias "On the Fly". Created with virus generation software, the worm tricked e-mail users into clicking on an attachment that purported to be a picture of Russian tennis star Kournikova. He was charged with spreading data via a computer network with the intent to cause damage.

-- Blaster worm and the Sobig e-mail virus disabled computers and snarled Internet traffic across the globe in August and September 2003. Sobig.F became one of the most widespread viruses ever, crippling corporate e-mail networks and filling home users' inboxes with a glut of messages before jetting copies off exponentially to more victims. The "Blaster", or "LovSan" worm spread through a security hole in Windows.

-- MyDoom - also known as Novarg or Shimgapi has spread rapidly, mostly in North America, accounting for one in nine messages globally. The volume of messages clogged networks and appeared to be concentrated in corporate environments. Later MyDoom.B, a new variant emerged to target Microsoft Corp.'s Web site, security experts said.

01 February, 2004

Radiation from PCs can be used for spying


In a computer, some of the most powerful radiation emanates from the monitor, a cathode-ray tube in which electron guns fire streams of electrons more than 60 times a second to produce the images displayed. That bombardment produces wave frequencies, some of which overlap with the familiar VHF and UHF television bands.

In short, the invisible, information-bearing radio waves from a monitor are remarkably similar to a broadcast TV signal. A spy's scanner need only tune in the waves and process them line by line to replicate the image on the original screen.