learn linux and unix commands - unix shell scripting

Phishing attack disguised as message from FDIC


 
Thread Tools Search this Thread
# 1  
Old 01-20-2009
Phishing attack disguised as message from FDIC

See today's DHS DailyOpen Source Infrastructure Report (DOSIR) for information regarding a phishing attack disguised as a message from the FDIC.  It is impacting the Fedwire.  Will it impact your business? 


The report isavailable at http://www.dhs.gov/xlibrary/assets/DHS_Daily_Report_2009-01-20.pdffor the next two weeks.  Later, it can befound at http://www.hspig.org/phpbb/viewforum.php?f=20.


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Cybersecurity

Found attack from

Hi, I have a belkin router installed and a look at the security log has got me worried a little bit. Security log: Fri Jan 29 20:41:46 2010 =>Found attack from 68.147.232.199. Source port is 58591 and destination port is 12426 which use the TCP protocol. Fri Jan 29 20:41:46 2010 ... (1 Reply)
Discussion started by: jld
1 Replies

2. Programming

How to limit max no of message in a posix message queue

Hii can anyone pls tell how to limit the max no of message in a posix message queue. I have made changes in proc/sys/fs/mqueue/msg_max But still whenever i try to read the value of max. message in the queue using attr.mq_curmsgs (where struct mq_attr attr) its giving the default value as 10.... (0 Replies)
Discussion started by: mohit3884
0 Replies

3. Windows & DOS: Issues & Discussions

Stanford security experts unveil defenses against ‘phishing’ attacks

It's an online con that is growing fast and stealing tens of millions of dollars. An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking Web site. Such “phishing” attacks exploit a universal weakness in online security: passwords. To read the rest of... (0 Replies)
Discussion started by: ZOverLord
0 Replies
Login or Register to Ask a Question
csgather(1)						    BSD General Commands Manual 					       csgather(1)

NAME
csgather -- Gather CoreStorage metadata for diagnosis SYNOPSIS
csgather -G dir device ... csgather -r mountPoint [-o filename] DESCRIPTION
csgather gathers CoreStorage metadata for diagnosis. It works in two modes. In the first mode where -G and a list of devices are provided, CoreStorage metadata on these list of devices will be collected. The col- lected information includes the size and UUID of the CoreStorage logical and physical volumes, the name of the logical volumes, the wrapped (encrypted) volume key (which can only be decrypted by a brute-force attack), user name and user login image file. No other user information (such as directory structure, file names, file content, etc) is collected. In the second mode where -r is provided, the encryption context which includes the wrapped volume key (which can only be decrypted by a brute-force attack), user name and user login image file will be collected. If the wrapped volume key is decrypted by a brute-force attack, the volume key used to encrypt data on CoreStorage Logical Volumes is in the clear. It is not mathematically possible to derive the user's passphrase from the volume key. The volume key is only useful when the attacker has access to the encrypted data in the CoreStorage Logical Volume, which are not collected by csgather. The following options are available: -G dir Gather all CoreStorage metadata and write into the specified directory. The given directory must not already exist. -o filename Specify the output file generated by the -r option. If not given, use standard output. -r mountPoint Find out the CoreStorage logical volume identified by the given mount point, and print its encryption context to the file given in the -o option. SEE ALSO
csdiagnose(1) HISTORY
The csgather utility first appeared along with CoreStorage in OS X 10.10.0. OS X
May 31, 2019 OS X