ICQ

ICQ

Once you were weaned off AOL, you still needed a reliable messenger to keep in touch with all your 133t friends and buddies, and back in the day, we didn’t have that newfangled skype software with its fancy video and voice chat, so if you wanted to send online messages, you used ICQ (I Seek You) and you got to toggle between instant message mode.....

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Secret-Spilling Sources at Risk Following Cryptome Breach

Secret-Spilling Sources at Risk Following Cryptome Breach

Ruxpin-Vanity-Page-660x244

Secret-spilling site Cryptome was hacked over the weekend, possibly exposing the identities of whistleblowers and other confidential sources, according to a hacker who contacted Wired.com and claimed responsibility for the breach.

The hacker said two intruders from the group Kryogeniks breached the long-running site, where they gained access to a repository of secret files and correspondence. Among them, the hacker claimed, were the records of self-proclaimed WikiLeaks insiders who have been the source of several unconfirmed tips supposedly detailing internal WikiLeaks matters.

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

10/18/12 Update: 2006 posting at forum - where Russell Handorf still contributes using his "grey hat hacker" handle "satanklawz" - suggests he has been working for FBI three years earlier than his resume claims; Adrian Lamo admits being "friends" with Handorf but still won't answer any real questions; Chet Uber offers to have Lamo "interview" me - Neal Rauhauser, who claims he has nothing to.....

Flashback to 1995

Flashback to 1995

Flashback to 1995: AOL Proggies By Marco on April 19, 2004 Inspired by a discussion on the Something Awful Forums, I remembered the time I spent using AOL in middle school. There were these programs ("proggies") that would hook into the AOL software and allow you to do special things, like easily type using color-faded text or extended ASCII characters. I had one of these.....

AOL Roll Dice

AOL Roll Dice

  Many people know the chat command: //roll But not many people know how to specify the number of dice and number of sides: //roll-dice##-sides### The amount of dice can be any whole number from one through fifteen. The amount of sides can be any whole number from one through 999. AOL will randomly pick a number fitting each of these paramaters and display them.....

Exploits Online by Tau

Exploits Online by Tau

exploits

Welcome to Tau’s AOL Exploits site. Here you will find up to date information on the great things you can do on AOL that are not officially supported by AOL along with other online goodies.

With so many people on AOL with so many people trying to more AOL exploits I encourage all of you to send me your screen shots, e-mails, or Instant Messages having to do with anything funny, interesting, or plain stupid. All credit will be given to you.

AOL Prog Passwords


All Passwords Are Case Sensitive. Prog Name Password Acid Burn PiXY RuLEz You! Adidas toolz poiuyt Afterlife Eraser is GoD Agent Orange I Crap On Lamers America Off Line maxuck or ivan is a fairy Anti Mass Mailer bud is blah AoBliss Tosser Welcome to the wonderful world of Bliss AOExtacy BoW 2 MaTT AOExtacy Phisher Matt is king   AOFuck 1."PiXY RuLEZ!" 2."WaNG DanG".....

AOL Warez Badbyz

AOL Warez Badbyz

What is BadByz? BadByz is an America Online based mp3 and movie distribution group How do I obtain the service BadByz offers? You must have an America Online account and enter the private chatroom "badbyz". Then use the server. If you do not know what a server is or how to use it please look at the tutorials section of this website. Why does BadByz.....

Glue³.bas

Glue³.bas

— ——• Glue³.bas by méèh •—— — 'This is My Seventh Module 'The biggest bas ever made....1306 Subs and Functions '--If you make any programs with this please 'email them to me i would like to see them-- '--AND, If You Have Any Ideas For My Next Bas 'Or Suggestions, and Comments, or Errors Email Me-- '!-#* If you have a web site please post.....

Chronx.bas v3.0

Chronx.bas v3.0

'Chronx.bas v3.0 by Chron__x ' *32 BIT* 'Coded in Visual Basic 6.0 Pro. For use with AOL 4.0 'Aim- iichronx 'Email- Chron__x@hotmail.com 'Webpage- Http://chronx.cjb.net ' **Chat Ocx Coming Soon** 'I need help with the name for it, if you can think of one please tell me and you will be put in the greets