It was nearly 70 degrees below zero outside, but the e-mail on a computer at the South Pole Research Center sent a different kind of chill through the scientists inside.
"I've hacked into the server. Pay me off or I'll sell the station's data to another country and tell the world how vulnerable you are," the message warned.
Proving it was no hoax, the message included scientific data showing the extortionist had roamed freely around the server, which controlled the 50 researchers' life-support systems.
Former New York City mayor Rudolph Giuliani's consulting firm and accounting firm Ernst & Young joined forces yesterday to help companies guard against computer hackers.
They unveiled their so-called Advance Security Centres in Ernst & Young's offices in New York's Times Square and in Houston, where staff members with military and corporate security backgrounds will toil away on computers to protect clients.
This is the second article in a three part series on tools that are useful during incident response and investigation after a compromise has occurred on a Linux, OpenBSD, or Solaris system. The first article focused on system tools, this one focuses on file system tools, and the next article will discuss network and other tools. The information used in these articles is based on OpenBSD 3.2, Debian GNU/Linux 3.0 (woody), RedHat 8.0 (psyche), and Solaris 9 (aka Solaris 2.9 or SunOS 5.9).
By grabbing a user's buddy list rather than scanning for vulnerable IP addresses, these worms have the potential to be more virulent than predecessors like Code Red, Slammer or Blaster, which spread over the internet rather than over IM networks, warned Neal Hindocha of Symantec Security Response.
Hackers are exploiting browser security flaws to hijack instant messaging (IM) accounts, security experts have warned.
When Microsoft decided to shut down its chat rooms for security reasons, it suggested IM as an alternative.
Corporations should be as concerned about personal computers inside the network perimeter as those riding its boundary, warns Symantec's security team.
Vincent Weafer, senior director of Symantec Security Response, said cyber-attackers are shifting their efforts from outside the intranet boundary to inside.
The attackers are taking an increasing interest in intranet-facing private network services in common desktop personal computers.