Login/New-Account | Search | Submit a Story! | Greplaw!??
 
GrepLaw
- About
- FAQ
- Discussions
- Messages
- Topics
- Authors

- Preferences
- Older Stuff
- Past Polls
- Submit Story
- XML/RSS

GrepLaw
This site is a production of the Berkman Center for Internet & Society. Please email if you have questions, contributions, or ideas about improving this site.

F & F
Family

Friends

 
NHTCU Looking for Clues with AV Firms
posted by scubacuda on Wednesday October 08, @12:39PM
from the nothing-that-the-Patriot-Act-III-can't-solve dept.
Security Reuters: Britain's National Hi-Tech Crime Unit is working with anti-virus firms to identify patterns in the source code of the most damaging Internet worms and virus programs to determine whether they are the work of organized subversive groups or crime syndicates. The hope is that buried somewhere in the lines of code will be clues to the author's identity, motive and possibly, future acts of sabotage. Of the dozens of viruses and worms that emerge on the Internet each week, none has been traced back to organized crime or subversives aiming to disrupt a country's infrastructure.

LeapFrog Sues Fisher-Price Over Interactive Book | SunnComm Threatens Suit Over Shift Key Circumvention  >

 

 
GrepLaw Login
Nickname:

Password:

[ Create a new account ]

Related Links
  • Reuters
  • National Hi-Tech Crime Unit
  • More on Security
  • Also by scubacuda
  • This discussion has been archived. No new comments can be posted.
    NHTCU Looking for Clues with AV Firms | Login/Create an Account | Top | 2 comments | Search Discussion
    Threshold:
    The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
    Sounds pretty futile.. (Score:1)
    by petal on Wednesday October 08, @04:12PM (#1315)
    User #835 Info
    Most Windows 'macro' virii, while they have some amount of 'fingerprint' usually end up getting copied and pasted... Same thing with UNIX shellcode. . One person makes an efficent tight bit of code, and everyone cuts and pastes it until the next bit of efficent tight code comes out. Good luck!
    In related news... (Score:1)
    by TFBW on Thursday October 09, @12:07PM (#1317)
    User #844 Info | http://www.nutters.org/user/famous
    Over at Wired News they have been interviewing [wired.com] miscreants who install reverse proxy software on compromised end-user computers and sell "stealth hosting" services based on it.

    The pontification continues at Nutters.org [nutters.org].

    Humanity has the stars in its future, and that future is too important to be lost under the burden of juvenile folly and ignorant superstition. - Isaac Asimov

    [ home | contribute story | older articles | past polls | faq | authors | preferences ]