Computer security has become a hot topic lately, to the point that even routine news are catched by some mainstream media, barely understood, then simplified and dramatized for the broad public consumption, becoming something completely different from the original fact.
The "eyespy" malware is proof of concept code written by a security software vendor to exemplify a kind of cyberattack they think will be more popular in the future - and to show how their security software can idrntify and neutralize it. Automated targeted attacks are now the most common threat to IT systems because they have become quick and easy to mount. An example: imagine you set the work email address as recovery email for a personal service you normally access with your home email credentials. Then the service is compromised (but probably the owner never realizes it) and someone is able to grab the password database: that password will be tried with your work email. It is funny (in a twisted way) to look at a company access log and spot clusters of password errors coming from the most improbable (faked) locations: a stolen password database has become available and all the script kiddies are trying to be the first to find a victim. Password reusing is a big security issue and it is always explained on security trainings, but there are still companies that don't have mandatory trainings or don't care to upgrade their systems with multi factor authentication, so this kind of traditional automated attack based on fixed scripts is still used. Eyespy authors are theorizing that the next level of threat will be based on dynamically generated, tailored scripts. I already see this trend on some attacks, altough still very far from the eyespy proof of concept. By the way, most malware is now targeting the browser session authentication cookies, this way they may be able to bypass multi factor authentication. Security has been relegated to the back seat for many years, and some time will be needed before reaching an acceptable level on most services and applications.
The "eyespy" malware is proof of concept code written by a security software vendor to exemplify a kind of cyberattack they think will be more popular in the future - and to show how their security software can idrntify and neutralize it. Automated targeted attacks are now the most common threat to IT systems because they have become quick and easy to mount. An example: imagine you set the work email address as recovery email for a personal service you normally access with your home email credentials. Then the service is compromised (but probably the owner never realizes it) and someone is able to grab the password database: that password will be tried with your work email. It is funny (in a twisted way) to look at a company access log and spot clusters of password errors coming from the most improbable (faked) locations: a stolen password database has become available and all the script kiddies are trying to be the first to find a victim. Password reusing is a big security issue and it is always explained on security trainings, but there are still companies that don't have mandatory trainings or don't care to upgrade their systems with multi factor authentication, so this kind of traditional automated attack based on fixed scripts is still used. Eyespy authors are theorizing that the next level of threat will be based on dynamically generated, tailored scripts. I already see this trend on some attacks, altough still very far from the eyespy proof of concept. By the way, most malware is now targeting the browser session authentication cookies, this way they may be able to bypass multi factor authentication. Security has been relegated to the back seat for many years, and some time will be needed before reaching an acceptable level on most services and applications.
Last edited:
I gotta say, I'm interested in the plot of the Colossus, despite it being a film from 1970.
The story "annihilate all humankind because they pose a threat" of the Terminator series is simply illogical, when there're so many more ways an AI takeover may happen.
The story "annihilate all humankind because they pose a threat" of the Terminator series is simply illogical, when there're so many more ways an AI takeover may happen.
Sort of. But don't start watching it expecting that sort of film. It's mostly talk, there's little action.it's kind of predecessor of Cyberdine Systems and The Terminator, isn't it?
I saw it back in the 70's at Uni and like 2001 it left a permanent imprint on me. I've not watched it for 40 years but recently got a Blu-Ray version and was pleased to find that it lived up to my memories of it. There's a lot in it to think about.
I've thought for a long time that our ever increasing dependence on computer networks represents an enormous potential liability. It's necessary for modern life though.
When I was a kid we got by without a lot of stuff that's taken for granted today. I never saw or used a computer until I was in college and it was a real big deal. We managed to get by without cell phones too. We actually persevered through these ghastly privations.
It could be our undoing. Better relearn that long division (do they even bother to teach that today?).
When I was a kid we got by without a lot of stuff that's taken for granted today. I never saw or used a computer until I was in college and it was a real big deal. We managed to get by without cell phones too. We actually persevered through these ghastly privations.
It could be our undoing. Better relearn that long division (do they even bother to teach that today?).
In the US at least you can stream Colossus: The Forbin project on Vimeo for free. I really liked it.
Ok the basics of preventing a virus on your computer.
Best practice limit only one of your computers to internet access.
Don’t open files that are mailed to you. Generally don’t open any files you don’t know all the details involved.
Learn about using safe mode.
Be wary of any C varient code that you don’t know where it came from or what it does.
You might consider running an operating system that is not popular!
If you computer is taking longer than normal to boot, pay attention and find out why.
Send me $100!
Contribute to this list.
My cousin Fred is generally credited with first using the term “Computer Virus.”
Best practice limit only one of your computers to internet access.
Don’t open files that are mailed to you. Generally don’t open any files you don’t know all the details involved.
Learn about using safe mode.
Be wary of any C varient code that you don’t know where it came from or what it does.
You might consider running an operating system that is not popular!
If you computer is taking longer than normal to boot, pay attention and find out why.
Send me $100!
Contribute to this list.
My cousin Fred is generally credited with first using the term “Computer Virus.”