Thanks to visit codestin.com
Credit goes to web.archive.org

CastleCops Home
Happy 5-Year Anniversary CastleCops! Enter our Contest 2007 in celebration and recognition of volunteerism. Spread the word!
  Need help? Click here to register for free! Registering removes the advertisements.

Donation/Premium
spacer
Donations. Become Premium Today! Premium Icon
block bottom
Security Central
spacer
· Home
· PIRT/Fried Phish
· Deutsch
· Wiki
· Newsletter
· O16/ActiveX
· CLSID List
· Contest2007
· Downloads
· Feedback (send)
· Forums
· HijackThis
· LSPs
· My Downloads
· O18
· O20
· O21
· O22
· O23
· O9
· Premium
· Private Messages
· Proxomitron
· Quizz
· Reviews
· Search
· Software
· StartupList
· Stories Archive
· Submit News
· Top
· Web Links
· Your Account
block bottom
spacer spacer
5-Year Anniversary Contest
Notice #2
As of approximately Feb 13th, 1730 hours EST, the following promoter is now participating in the contest:
  • Emsi Software: 1,000 Licenses of a-squared Anti-Malware 2.1 ($39,950)

Notice #1
As of approximately Feb 13th, 1600 hours EST, the following promoters are now participating in the contest:
  • Kaspersky: 20 Copies of Internet Security 6.0 ($1,599)
  • Dave Kleiman: 20 Books of Winternals: Defragmentation, Recovery, and Administration Field Guide ($999)
Participate in our [Contest], celebrating 5-Years of CastleCops.

Product Reviews by Members

Thumbs UpNeutralThumbs Down



...yesterday...
· Kaspersky Anti-Virus Personal Pro
· AVG Free: 4 rpl
· Windows
...yesterday...
· Windows
· Windows
· Windows
...yesterday...
· Spyware Doctor
· AVG Free: 5 rpl
· D-Link Wireless-G: 3 rpl
--> submit your own review <--

New Community Posts

[Forums] [RSS] [ATOM]

image Advisories!: Beware 800-320-9807 is a Verizon VOIP Phish image
Phishing
The normal definition for a Vish or VOIP Phish is a dialer which has been set up on a VOIP line and is calling out to numbers in a given area. In this case the Vish was not a call that was made, but a text message which was sent to the phone. Wikipedia says VOIP Spam is "as-yet non-existent problem". Given what transpired today I tend to believe it is the next up and coming abuse in a wave of what is to come as technology grows.

Anyone who has a cell coverage through Verizon and gets text messages from Verizon knows the subject line of the message says: Free VZW MSG. When you see that you expect it has something to do with your account. I generally get a message when our bill is ready to be reviewed and also again to confirm payment has been received. When we get a txt message from Verizon, both Paul and I get it, as my phone is the secondary line on the account. Had he also gotten a message, I would not have checked my phone until much later, but since he didn't and the subject line made it appear to be from Verizon I was curious. I was very surprised to read I had exceeded our text messaging quota despite the fact that we have unlimited txt messaging in our package.

Note: Updated 7:16 PM EST
Posted by Robin  on Thursday, 08 February 2007 @ 18:39:37 EST (826 reads)
(» Read More... | 3758 bytes more | TrackBack (0) | comments? | Advisories! | Score: 3.75)
image

image Distributed Computing: Climate Change 2007 image
Team CastleCops
RuyLopez writes "On 2 February, the Intergovernmental Panel on Climate Change (IPCC) released its long awaited Fourth Assessment Report Climate Change 2007. IPCC was established in 1988 by the World Meteorological Organization (WMO) and the United Nations Environment Programme (UNEP) with the mission “to assess on a comprehensive, objective, open and transparent basis the scientific, technical and socio-economic information relevant to understanding the scientific basis of risk of human-induced climate change, its potential impacts and options for adaptation and mitigation. The IPCC does not carry out research nor does it monitor climate related data or other relevant parameters. It bases its assessment mainly on peer reviewed and published scientific/technical literature.”

Two conclusions from the Climate Change 2007 report are particularly notable:"
Posted by Robin  on Thursday, 08 February 2007 @ 18:00:57 EST (459 reads)
(» Read More... | 2271 bytes more | TrackBack (0) | comments? | Distributed Computing | Score: 0)
image

image Arbor Networks new ATLAS Service image
Surveillance
The ATLAS portal today is a public resource that delivers a sub-set of the intelligence derived from the ATLAS sensor network on host/port scanning activity, zero-day exploits and worm propagation, security events, vulnerability disclosures and dynamic botnet and phishing infrastructures. It includes:

- Global Threat Map: Real-time visibility into globally propagating threats
- Threat Briefs: Summarizing the most significant security events that have taken place over the past 24 hours
- Top Threat Sources: Multi-dimensional visualization of originating attack activity
- Threat Index: Summarizing Internet malicious activity by offering detailed threat ratings
- Top Internet Attacks: 24-hour snapshot of the most prevalent exploits being used to launch attacks globally
- Vulnerability Risk Index: Determines the most dangerous vulnerabilities being exploited on the Internet today

Our Phishing Incident Reporting and Termination (PIRT) Squad, among other sources, feeds Arbor Networks its phishing data.
Posted by Paul  on Tuesday, 06 February 2007 @ 11:44:33 EST (622 reads)
(TrackBack (0) | comments? | Score: 0)
image

image CounterSpy 2 Released image
Sunbelt Software
eburger68 writes: Hi All:

Sunbelt Software today announced the release of CounterSpy 2, its consumer anti-spyware application. You can read the press release for this event here:

http://www.sunbelt-software.com/Press.cfm?id=173

More product info can be found here:

http://www.sunbelt-software.com/CounterSpy.cfm

For full details and how to keep Windows Defender running read this thread in the official CounterSpy forum.
Posted by Paul  on Monday, 05 February 2007 @ 23:29:39 EST (1281 reads)
(TrackBack (0) | comments? | Score: 0)
image

image Malware Attacks Getting Much Worse image
Cyber Security
cj writes "
By Bob Keefe
February 2, 2007

Increasingly, organized crime rings, including many in Russia, China and South America, are behind computer viruses, spam and scams. With the wherewithal to hire high-tech help and manage major operations, their techniques have quickly made many security software programs -- perhaps including the ones you might have on your home or office PC -- obsolete. "
Posted by Paul  on Sunday, 04 February 2007 @ 13:44:26 EST (1439 reads)
(» Read More... | 820 bytes more | TrackBack (0) | comments? | Score: 2)
image

Google
 
castlecops.com Web
wiki.castlecops.com
spacer
Login
spacer
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
Usage signifies AUP acceptance
· New User? ·
Click here to create a registered account.
block bottom
Toolkit
spacer
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
block bottom
Link To Us
spacer
CastleCops Button

More Banners
block bottom
spacer spacer