The Melissa virus of 1999

The Melissa virus of 1999

The Melissa virus was a mass-mailing macro virus from March 1999. It was one of the more notorious computer viruses of the 1990s, and reportedly the author named it for a dancer he met in a Florida nightclub. Authorities quickly identified the author, David Lee Smith, and arrested him in New Jersey on April 1, 1999. He served two and a half years in prison and paid $7,500 in fines for creating the virus.

Read more

Remembering the Michelangelo virus

Remembering the Michelangelo virus

Remember the Michelangelo virus? If you don’t remember, on March 6, 1992, Michelangelo was programmed to overwrite the first 100 sectors of a hard drive–not quite as destructive as formatting a drive, but to the average user, the effect is the same. It was a huge scare–John McAfee predicted five million computers would be affected–but largely was a non-event.

Those of you studying for security certifications would do well to remember that Michelangelo is a prime example of a virus and a logic bomb. Viruses replicate; logic bombs do something when an event triggers. Malware doesn’t always fit neatly into specific categories–crossovers are common.
Read more

Year 2038 problem

Year 2038 problem

We need to talk about the year 2038 problem. The year 2038 problem exists on Unix and Unix-like systems, and other software that borrowed the Unix time standard. The problem is that on January 19, 2038, the 32 bit integer that Unix uses to represent time is going to wrap around. And then the computer is going to think it is December 13, 1901. If this sounds a lot like the Y2K problem, you’re not wrong. The dates involved are different, but the effect is very similar.

Read more

The Egghead breach of 2000

The Egghead breach of 2000

It was 25 years ago, December 22, 2000, that Egghead’s website, egghead.com, was hacked, exposing 3 and 1/2 million credit card numbers. This incident raised a question we’ve been asking ever since. How do we know that our payment information is safe?

Read more

Why Intel acquired McAfee, then un-bought it

Why Intel acquired McAfee, then un-bought it

On August 19, 2010, CPU manufacturer Intel purchased antivirus maker McAfee. At the time, few people knew why. And let’s just say fewer people were surprised when Intel unacquired McAfee in April 2017 than they were when they made the acquisition.

Read more

If you found this post informative or helpful, please share it!

Code Red worm, July 13, 2001

Code Red worm, July 13, 2001

Code Red was a computer worm that exploited one of the earliest notorious Microsoft vulnerabilities, a buffer overflow in Microsoft IIS. It is credited as the first large scale mixed threat attack against enterprise networks. Code red was released July 13, 2001 although it was first observed July 15, 2001. Infections peaked July 19, 2001, infecting 359,000 servers worldwide.

Read more

Why the Wannacry outbreak was so bad

Why the Wannacry outbreak was so bad

On May 12, 2017, ransomware named Wannacry started spreading across the globe, infecting and encrypting Windows systems by exploiting CVE-2017-0144, a flaw that a two-month-old Microsoft patch, MS17-010, had fixed.

It quickly became one of the biggest Windows outbreaks ever. Why was it so bad, and what could have made it go better?

Read more

Troubleshooting long scan times in Tenable Security Center

Troubleshooting long scan times in Tenable Security Center

I can never find this when I need it, so I am going to write up how I troubleshoot long scan times in Tenable Security Center. And if it helps you too, so be it. Usually when a Security Center scan takes forever, it’s because one or two hosts is responding much more slowly than the rest, holding up the entire scan. The scan won’t complete until every system finishes. Finding the slow hosts so you can troubleshoot them, or at least move them to their own scan, can help you keep the scan from dragging on forever.

Read more

Why we call software updates patches

Why we call software updates patches

It’s Patch Tuesday, the day Microsoft and Adobe grace us with new software updates to track, argue about, and maybe someday deploy to our computer systems. But have you ever wondered why we call software updates “patches?” What’s the meaning of the word patch?

Read more

Should you use a face scan, fingerprint, or passkey?

Should you use a face scan, fingerprint, or passkey?

What’s better, biometrics like a fingerprint or face recognition, a pass key, or old fashioned passwords? A couple of different conversations I had recently spurred this question, and I think it’s worth exploring.

Read more