lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <JAEGIICLHAJHLINAEHLBOEAOCPAA.erc@pobox.com>
From: erc at pobox.com (Ed Carp)
Subject: HEADS UP VIRUS BEING SPREAD one of our rea

> It is an existing, well-known (and "old") virus, reliably ID'ed by
> just about any virus scanner updated since late Feb this year.  There
> are abundant informed and informative descriptions of how it works
> all over the web.  It seems Mr Wood and your good self must be about
> the only "security experts" who have not already encountered it.

I wonder, how does one make oneself such an excellent target for virii so
one can claim bragging rights such as those?  "Gee, we were the *first* to
discover XXX virus!"  Or does that mean someone at the company was stupid
enough to double-click on an unknown attachment from someone they didn't
know?  Or is the trick to subscribe to every known mailing list in
existence, so as to be spammed to death in hopes of discovering something
new?

Of course, most of these so-called "security firms" and such are just a guy
in the basement of his parent's house anyway...

--Ed the cynic


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ