Couple of articles/blog posts worth taking a look at
Info on Ghostnet
*mirrors of the two papers are available above
I am personally glad when i see people getting pwned via client-sides make the news. Hear me and Vince talk about it a Notacon and DojoSec this month!
It's also interesting, at least to me, to see real cyber warfare in action. cyber warfare doesnt have to be about stuff going boom, but having another nation state all in your network for god knows how long certainly makes you wonder how much of your "secret" activity isnt secret anymore.
Application Operation System Fingerprinting From Dan Crowley
his blog: http://x10security.org/blog
Sweet new updates to metasploit!
no link...just svn up your trunk and enjoy! the snmp community scanner is nice.
Weaponized Malware ??
while the question of what the home user is to do is tougher, in the enterprise keeping up with what is egressing your network may help with catching that malware calling home. It probably time to start looking at the problem as its going to happen how do I detect and respond instead of just "hoping" it doesnt happen.
What is conficker going to do on April 1st?
do we worry or not? do you deserve what you get if you still have it in your network after this long?
If you allow gaming systems on your network without authentication can an attacker abuse that?
definitely something to keep in mind if a network requires authentication, can you change your MAC to that of a wii or xbox360 and gain access?
Exploiting Unicode Enabled Software by Chris Weber