|Main Archive Page > Month Archives > full-disclosure-uk archives|
-----BEGIN PGP SIGNED MESSAGE-----
nice hack babe:))
On Sun, 11 Jan 2009 18:32:09 -0500 n3td3v <email@example.com>
>Their PGP keys have expired =)
>Sending email to US-CERT
>When sending sensitive information to US-CERT via email, we
>you to encrypt your messages. US-CERT uses multiple public keys
>upon their purpose. If the purpose of your communication is a
>security incident report, vulnerability report, or any other
>question related to cyber security, please use the following key:
>User ID: US-CERT Security Operations Center <firstname.lastname@example.org>
>Key ID: B832BE70
>Key Type: RSA
>Key size: 2048
>Fingerprint: 195E 7A9E CCD9 9504 3CA7 E26E 13D4 4840 B832 BE70
>Information about other keys can be found on Contacting US-CERT.
>Receiving publications in email from US-CERT
>US-CERT signs the email distribution of all US-CERT publications,
>including Cyber Security Alerts, Technical Cyber Security Alerts,
>Cyber Security Bulletins and Cyber Security Tips with the
>User ID: US-CERT Publications Key <email@example.com>
>Key ID: 0x3E1F88AB
>Key Type: RSA
>Key Size: 2048
>Fingerprint: E0BF 6D0E 88C1 1FFC F93F 571B 7207 9633 3E1F 88AB
>On Sun, Jan 11, 2009 at 10:29 PM, Chris Wallis <firstname.lastname@example.org>
>> Just got this from US Cert. With what's going on with this list.
>> I might share with you all...
>> With some of the crap on this list lately I really do hope it is
>> ~Chris Wallis
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> US-CERT Current Activity
>> Malicious Code Circulating via Israel/Hamas Conflict Spam
>> Original release date: January 9, 2009 at 9:25 am Last revised:
>> 2009 at 9:25 am
>> US-CERT is aware of public reports of malicious code circulating
>> email messages related to the Israel/Hamas conflict in Gaza.
>> These messages may contain factual information about the
>> appear to come from CNN. Additionally, the messages indicate
>> additional news coverage of the conflict can be viewed by
>following a link
>> provided in the email body. If users click on this link, they
>> redirected to a bogus CNN website that appears to contain a
>> Users who attempt to view this video will be prompted to update
>to a new
>> version of Adobe Flash Player in order to view the video. This
>> not a legitimate Adobe Flash Player update; it is malicious
>code. If users
>> download this executable file, malicious code may be installed
>> US-CERT encourages users and administrators to take the
>> preventative measures to help mitigate the security risks:
>> * Install antivirus software, and keep the virus signatures up
>> * Do not follow unsolicited links and do not open unsolicited
>> * Use caution when visiting untrusted websites.
>> * Use caution when downloading and installing applications.
>> * Obtain software applications and updates directly from the
>> vendor's website.
>> * Refer to the Recognizing and Avoiding Email Scams (pdf)
>> for more information on avoiding email scams.
>> * Refer to the Avoiding Social Engineering and Phishing Attacks
>> document for more information on social engineering attacks.
>> Relevant Url(s):
>> This entry is available at
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.5 (GNU/Linux)
>> -----END PGP SIGNATURE-----
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>Full-Disclosure - We believe in it.
>Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 3.0
-----END PGP SIGNATURE----- -- Not having a degree dragging you down?? Click here for free information. http://tagline.hushmail.com/fc/PnY6qxtpfWTkztv1CWWRfdCq2BwJiLB6qjjQgOYVTvAspZfGKCGXe/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/