unix and linux commands - unix shell scripting

Phishing attack disguised as message from FDIC


 
Thread Tools Search this Thread
# 1  
Old 01-20-2009
Phishing attack disguised as message from FDIC

See today's DHS DailyOpen Source Infrastructure Report (DOSIR) for information regarding a phishing attack disguised as a message from the FDIC.  It is impacting the Fedwire.  Will it impact your business? 


The report isavailable at http://www.dhs.gov/xlibrary/assets/DHS_Daily_Report_2009-01-20.pdffor the next two weeks.  Later, it can befound at http://www.hspig.org/phpbb/viewforum.php?f=20.


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Cybersecurity

Found attack from

Hi, I have a belkin router installed and a look at the security log has got me worried a little bit. Security log: Fri Jan 29 20:41:46 2010 =>Found attack from 68.147.232.199. Source port is 58591 and destination port is 12426 which use the TCP protocol. Fri Jan 29 20:41:46 2010 ... (1 Reply)
Discussion started by: jld
1 Replies

2. Programming

How to limit max no of message in a posix message queue

Hii can anyone pls tell how to limit the max no of message in a posix message queue. I have made changes in proc/sys/fs/mqueue/msg_max But still whenever i try to read the value of max. message in the queue using attr.mq_curmsgs (where struct mq_attr attr) its giving the default value as 10.... (0 Replies)
Discussion started by: mohit3884
0 Replies

3. Windows & DOS: Issues & Discussions

Stanford security experts unveil defenses against ‘phishing’ attacks

It's an online con that is growing fast and stealing tens of millions of dollars. An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking Web site. Such “phishing” attacks exploit a universal weakness in online security: passwords. To read the rest of... (0 Replies)
Discussion started by: ZOverLord
0 Replies
Login or Register to Ask a Question
CRACK-ATTACK(6) 						  [FIXME: manual]						   CRACK-ATTACK(6)

NAME
crack-attack - multiplayer OpenGL puzzle game like "Tetris Attack" SYNOPSIS
crack-attack {{[--server PORT] | [-X] | [--wait]} {[SERVER] | [-X]} {[--solo] | [-X]}} [--name NAME] DESCRIPTION
Crack Attack is roughly based on the Super Nintendo game "Tetris Attack". Slowly, your stack of colored blocks grows from the bottom, and you've got to make sure it never reaches the top. If it does, you lose. To eliminate blocks from the stack, line up at least three of one color, horizontally or vertically. Once you do, those blocks disappear, and put off slightly your inevitable demise. Crack Attack essentially requires hardware acceleration. For Xorg users, this means you want DRI. COPYRIGHT
Copyright (C) 2000 Daniel Nelson This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. The GNU General Public License can be found online at http://www.gnu.org/copyleft/gpl.html. Additionally, a copy can be obtained by writing to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. DISCLAIMER
It is important to realize that the name of Crack Attack! X-treme play mode is meant to be humorous, and thus should not itself be the subject of derision. Thank you. AUTHOR
Direct comments, questions, praise, flames, and job offers to nelson@aluminumangel.org. Visit my homepage at aluminumangel.org. This manual page was written by Colin Walters walters@debian.org for the Debian GNU/Linux system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts. A copy of Version 1.2 of the Free Documentation License is included in the file debian/copyright in the crack-attack source package. This file is also available in the Debian package as /usr/share/doc/crack-attack/copyright. [FIXME: source] 11/17/2011 CRACK-ATTACK(6)