Quick Links: SpywareGuide Greynets Blog | SpywareGuide Product Database | SpywareGuide Company Database | SpywareGuide Categories
Search SpywareGuide Database & Site
Security Email Alerts & Updates
SpywareGuide powered by FaceTime Security Labs

Spyware Warriors and the Digital UnderGround: Part 1 Podcast

by SpywareGuide Staff

Download it direct or listen in MP3 Format!

We talked about this some time ago and gave you a teaser. Now  Part 1 has been put out on the net- and it gets wild! If you want to hear spyware researchers taking you into the inner workings on how it all goes down, along with some other tidbits that will shock and awe, surf on over to hear about the following subjects:

00:01 - 02:37 Introduction
02:38 - 04:08 What does Facetime do and for whom?
04:09 - 05:19 What is a botnet network? (Boyd)
05:20 - 06:11 What are hackers and e-criminals motivations? (Boyd)
06:11 - 07:54 Things changing for the worse; paradigm shift (Porter)
07:55 - 10:19 The story of RinCe, tipster on major bust (Boyd, Porter)
10:20 - 11:43 Anatomy of a good tipster; motivations (Boyd)
11:44 - 12:53 Changing vectors & new dangerous hacker tactics (Porter)
12:54 - 13:23 Instant Messaging no longer safe (Porter)
13:24 - 13:43 Botnet criminal motivations (Boyd)
13:44 - 14:33 New perspectives (Molander)
14:34 - 16:23 Attack complexity increasing, vectors changing (Porter)
16:24 - 16:58 Dark Economy: Organized crime moving online (Porter)
16:59 - 19:02 Cloak & Dagger: How to penetrate a botnet (Boyd)
19:03 - 21:56 Gathering intelligence from 'the underbelly' (Boyd)
22:54 - 23:33 Fallout from adware, spyware & Web crime (Porter)
23:34 - 25:10 Warning to e-commerce executives (Porter)

Count on Part 2 to appear shortly. If you liked Part 1, why not vote for it on Digg.com?

Unless otherwise noted this article is Copyright © 2022 by FaceTime Communications, Inc. This article may not be resold, reprinted, or redistributed for compensation of any kind without prior written permission from FaceTime Communications, Inc. For reprint or media inquires please contact us with the phrase "Spyware Guide Articles" in the subject line and we will by happy to assist you. Links to this article from other websites are appreciated and encouraged. Users are also encouraged to utilize our RSS system to provide unique content and extracts for their site.

Read other articles (back to full list)

Help with the BUST!
Click here and give us what details you have and let our international research team take it from there. If you desire your report will remain anonymous.
Recent Blog Posts
Notice: Undefined index: version in /data/www/spywareguide/magpierss/rss_parse.inc on line 228
  • A Year In Security
  • Youtube Comment Bot Spams In Waves
  • VGA Awards Trailers Used As Bait For Spam Offers
  • Fake Visa Electronic Report Serves Up Zbot Data Stealer
  • Banned Console Owners Beat The System - With Stickers
  • Spot The Hack
  • The Futility Of EULAs
  • Auto Whaler Spears Phishers
  • Fake Porn Grabbers Snag Nothing But Malware
  • Console DDoS Botnets - A Thriving Industry
  • Recent Modifications
    2022-11-28  Adult Networks/Services
    2017-2-10  Adult Hosts
    2016-3-30  CoolWebSearch
    2015-9-29  Malicious URLS
    2015-5-19  Dialers
    2015-1-5  Email Threats
    2013-7-20  Date Manager
    2013-4-10  BeeBus
    2012-12-18  JT.Moonwalk
    2012-12-18  Sadbiz

    Site EULA | Site Map | Contact Us | About Us | Site and Spyware FAQ | Advertise | RSS Feeds  | Link To Us | SpywareGuide Japan Japanese

    © Copyright 2007, FaceTime Communications, Inc. All rights reserved.