Why has it taken six years for someone to take a contract out on my life? Or, more accurately, for a scammer to send me an email demanding payment of a bribe in order for him to cancel a supposed contract. The first hitman scam was spotted almost exactly six years ago in December 2006, and transported from email to the world of SMS mobile phone texting a couple of years later. Then it all went quiet for a couple of years, as far as I can tell, but the hitman scam is back and I got one. ![dweb-hitman](/attachments/small/0/dweb-hitman.jpg "align-right") …

Member Avatar
Member Avatar
+2 forum 8

It's not the first time that Johnny Depp has died according to the Internet, but this time he is not alone. According to an ongoing online campaign, celebrities including Beyonce, Bon Jovi, Brad Pitt, Cameron Diaz and David Beckham have all been killed in tragic circumstances. Perhaps surprisingly [URL="http://www.daniweb.com/news/thread306364.html"]Lady Gaga and Justin Bieber have escaped unharmed[/URL] for now. [attach]16854[/attach]The last time we reported that [URL="http://www.daniweb.com/news/story254955.html"]Johnny Depp had not been killed in a car crash[/URL] there was no overtly malicious intent, but rather just Twitter getting carried away with itself after someone picked up on an old hoax headline which had …

Member Avatar
+0 forum 0

No sooner had the news of the untimely [URL="http://www.itpro.co.uk/blogs/daveyw/2009/06/28/that-michael-jackson-effect/"]death of Michael Jackson[/URL] hit the Internet than the vultures started circling. For once it was not the gossip columnists and tabloid journalists digging up the dirt, but rather spammers and hackers looking to exploit a golden opportunity to distribute their wares and expose a very sick sense of humour. The very fact that there has been so much media coverage of the Michael Jackson death, and at around the same time Charlie's Angels actress Farrah Fawcett lost her battle for life, pretty much paved the way for the spammers to be …

Member Avatar
Member Avatar
+0 forum 1

I would like to think that anyone watching, reading or listening to news reports of the unfolding tragedy that is post-earthquake Haiti could not fail to be moved first to tears and then prompted to want to do something. Most people have responded by asking themselves 'what can I do to help?' and have found the answer to be to donate money to the likes of the Red Cross or similar which is organising a disaster emergency fund to help the poor folk of Haiti. Some, though, have responded by asking 'how can I exploit the situation to satisfy my …

Member Avatar
Member Avatar
+2 forum 2

This is going to be a high-risk blog entry, I know. But I'm in the UK, it's 1 April at eight minutes past ten in the morning and so far we've had no reports of mass outbreaks of the Conficker virus. The BBC was suggesting it was all overblown in a report [URL="http://news.bbc.co.uk/1/hi/technology/7973131.stm"]yesterday[/URL]. This is actually quite brilliant, if it doesn't turn into a 'UK got off lightly' story (which it still could, or it could break out midday or something). Someone has not written a virus, not propogated it and then managed to disrupt and hijack a load of …

Member Avatar
Member Avatar
+0 forum 1

I could have sworn that only Apple was making Apple-compatible computers. I remember well the era in which Apple famously granted—then revoked—licenses to Motorola and others to manufacture hardware that would run Mac OS. As I read today that a company called Psystar Corp. [URL="http://www.psystar.com"](www.psystar.com)[/URL] was selling “an alternative to pricey Apple hardware,” I thought the rules had changed while I wasn’t looking. Or did they? Unfortunately, the whole thing appears to be a complete scam, and one that almost every media outlet that covered it fell for hook, line and sinker. Googling “psystar” returns about half a million hits, …

Member Avatar
+0 forum 0

Well, what a weekend that has been. Ever since the reports started emerging online of a brute force attack on the Vista activation code using a modified version of the original software license manager script file I have been, shall we say, dubious as to the authenticity of the claim. Not least because amongst all my contacts in the security research business, on both sides of the industry fence, I failed to find a single one who could verify the crack through their own personal experience. Oh, there have been plenty of reports online of people finding legitimate code keys …

Member Avatar
Member Avatar
+0 forum 3

Recently one of the most talked about things is this Apple Wifi hack that was demonstrated by a group called SecureWorks at one of the largest security conferences, Defcon. [URL="http://www.youtube.com/watch?v=chtQ1bcHLZQ&mode=related&search="]Here is a link[/URL] to the video so you guys can watch the video yourselves. Now Here is a link to an[URL="http://daringfireball.net/2006/08/curious_case"] article [/URL]similiar to most articles saying that this video is a hoax. Now if you have watched the video and read an article or similiar one than a question comes to mind. Why are the people writing all these articles and going on and on about something you would …

Member Avatar
Member Avatar
+0 forum 2

Belkin has announced the launch of their N1 range of next generation wireless routers based upon a new WiFi standard that could extend the range of existing ‘wireless-G’ solutions by a factor of 4, and speeds by as much as 12. This might bring out the excited little geek in me, were it not for the fact that there isn’t any standard yet, no guarantee it will work properly with other 802.11n kit (even from the same manufacturer) now or in the future, and most damning of all: nobody really needs it. OK, so when has need ever stopped an …

Member Avatar
Member Avatar
+0 forum 9

Recently, I noticed some strangeness on my home wireless network. Sometimes the speed would be slower than normal, I couldn't print to my printer, and some of my more advanced router settings (for port forwarding, firewall, etc.) would seem to be "lost". As it turns out, my laptop was attaching to my next-door-neighbor's network. When I went to help him out, we saw that he could see HIS neighbor's network! Both had failed to do some basic wireless security. Failing to secure your network could have several negative consequences. First, it's your network. You don't want freeloaders using your bandwidth. …

Member Avatar
Member Avatar
+0 forum 4

The End.