How Docker Is a Dick

You know Docker, that darling of the digerati? The application that is revolutionizing the DevOps world? That god damned motherfucking piece of ill behaved software that is as smug and patronizing as most everyone I’ve ever come in contact with who preaches the Gospel of Docker? My anger, it is getting ahead of me. Sorry.…

Is next: Duqu

A great intro to the next big security threat can be found here—ripped from the pages of Mefi as always. The architecture of this is just phenomenal. I wish I was half as good as the folks who put Stux/Duqu together. Then again, I’d probably be rabitting for the NSA or somesuch and that’s not…

Storm Enters Age of Empire

After just over a year, Storm has become an intractable part of the Internet environment. Over Valentine’s Day it accounted for up to 5% of all Internet traffic, coming to life after months of relative idleness. Read more in this accessible article: Storm botnet takes advantage of Valentine’s Day

Son of Storm?

Dark Reading—CMP Technology’s offering for the occasional suit who thinks about security issues—runs down the three biggest bot-nets currently out there. Not a lot of technical analysis going on but interesting in a big picture sort of way. I’m still amazed that Rbot is still alive and kicking to the degree it is.

Public Service Announcement

I was a bit intrigued by a certain referrer in my log file who has been drifting at the bottom for the past week+ but suddenly shot up into the top 5 yesterday. The link ostensibly goes to http://tvsetmp3.com/ but gets redirected to http://ismymovies.com/. The page is constructed to look like it throws a system…

New Storm Variant

Storm takes on a new guise aimed at the paranoid set. This stuff is just incredibly genius… Private Detective Scare is Storm Trojan

The Coming Storm

I’ve been following the ever-increasing Storm Worm phenomena since it’s arrival almost a year ago. I was originally impressed by the relative polish of its social engineering aspects. It has always seemed to me that all manner of phishing, social engineering, and general spam vectors have had some very obvious clues. It’s like the individual…