ISW Security Papers Contest
About Us

ISW News & Events

Text Library

Submit Your Paper
Recommended Reading
Contact Us

Subscribe to our monthly newsletter and receive updates on:
Security/Hack Challenges
ISW's Monthly Contest Prizes & Winners
Recommended Security Books & Reviews
Recently Published Papers
Click here to subscribe/unsubscribe!

Opt-in Terms | Archives
What is the top security concern you have today?
Virtual System Attacks
Social Network

Best Security Papers of the Month Contest:

Contest FAQs

Prizes Catalog

Markus Jakobsson & Zulfikar Ramzan

Read the review here!


A major objective of the Info Security Writers is seeking the security enthusiasts who write. Most of the site’s content is generated by these people willing to share their knowledge and experiences on the various aspects of security/hacking via original white papers, articles and projects.

Follow us on Twitter @infosecwriters .

Click here for more info on SWG

Text Library contribute, read & rate security papers Recommended Reading comprehensive book reviews
Hitchhiker's World contribute articles & personal commentaries
Policies contribute & download policies
Forums partake in questions & discussions Quiz! the Netcat Geek Quiz here!
11/04/14: TERMPAPER: Smart Phone Hacking - Travis Mitchell submits this termpaper on the risks and threats to cell phones today.
12/05/12: Internet Acceptable Use Policies: Drawing the line - Raymond Pitzen submits this paper on Acceptable Use Policies and things to consider when creating your own.
11/05/12: Securing Amazon Web Services (AWS) and Simple Storage Service (Amazon S3) Security - David Borland submits this paper on Amazon AWS security basics. A very good overvie wif you are considering Amazon as a cloud provider and want to know more about the security they provide.
10/05/12: Getting maximum value from Penetration Testing - This vendor provided paper is a little different from most papers on Penetration Testing, in that it takes a holistic approach to the subject matter, and discusses both the strengths and weaknesses of Penetration Testing, and attempts to inform the reader in such a way as to empower them to extract maximum value from the exercise (whether they are doing it themselves or paying some external firm to).
06/12/11: Old School Newbie Guide circa 2000 - This is a flashback paper written by the founder and creator of SWG, our original site. Later it changed ownership and direction and became ISW. To those that remember Raven, enjoy! This is in celebration of our 10 year anniversary at ISW!
29/11/11: Analysis of Malicious Software Infections - Kenneth Davis submits this paper on a study of Malicious Softwares. He discussed the threats and ways to help mitigate the risks associated.
28/11/11: Malware in Information Security - Jared Dukes submits this paper on Malware. He discusses the history of Malware as well as reasons one could become infected.
27/11/11: DoS! Denial of Service - Kevin Hattingh submits this educational paper on DoS. He includes a dmonstration as well as how it is being used in modern day attacks.
09/12/10: An Analysis of the IDS Penetration Tool: Metasploit - Josh Marquez writes this introductory paper on Metasploit.
26/07/10: Experimental Review of IPSec Features to Enhance IP Security - Shilpa Nandamuri writes this paper that discusses IPSEC, how it works and touches on IKE, AHs and ESP for those not familair with it. anticipates your written contributions. CLICK HERE for writing guidelines & other criteria.

FYODOR reports CNET Trojanizes Downloads!!! - 2011-12-06
Click here to close the news item.
Hi Folks. I've just discovered that C|Net's Download.Com site has started wrapping their Nmap downloads (as well as other free software like VLC) in a trojan installer which does things like installing a sketchy 'StartNow' toolbar, changing the user's default search engine to Microsoft Bing, and changing their home page to Microsoft's MSN.

The way it works is that C|Net's download page (screenshot attached) offers what they claim to be Nmap's Windows installer. They even provide the correct file size for our official installer. But users actually get a Cnet-created trojan installer. That program does the dirty work before downloading and executing Nmap's real installer. Of course the problem is that users often just click through installer screens, trusting that gave them the real installer and knowing that the Nmap project wouldn't put malicious code in our installer. Then the next time the user opens their browser, they find that their computer is hosed with crappy toolbars, Bing searches, Microsoft as their home page, and whatever other shenanigans the software performs! The worst thing is that users will think we (Nmap Project) did this to them! I took and attached a screen shot of the C|Net trojan Nmap installer in action. Note how they use our registered 'Nmap' trademark in big letters right above the malware 'special offer' as if we somehow endorsed or allowed this. Of course they also violated our trademark by claiming this download is an Nmap installer when we have nothing to do with the proprietary trojan installer. In addition to the deception and trademark violation, and potential violation of the Computer Fraud and Abuse Act, this clearly violates Nmap's copyright. This is exactly why Nmap isn't under the plain GPL. Our license ( specifically adds a clause forbidding software which 'integrates/includes/aggregates Nmap into a proprietary executable installer' unless that software itself conforms to various GPL requirements (this proprietary C|Net software and the toolbar don't). We've long known that malicious parties might try to distribute a trojan Nmap installer, but we never thought it would be C|Net's, which is owned by CBS! And we never thought Microsoft would be sponsoring this activity! It is worth noting that C|Net's exact schemes vary. Here is a story about their shenanigans: It is interesting to compare the trojaned VLC screenshot in that article with the Nmap one I've attached. In that case, the user just clicks 'Next step' to have their machine infected. And they wrote 'SAFE, TRUSTED, AND SPYWARE FREE' in the trojan-VLC title bar. It is telling that they decided to remove that statement in their newer trojan installer. In fact, if we UPX-unpack the Trojan CNet executable and send it to, it is detected as malware by Panda, McAfee, F-Secure, etc: According to's own stats, hundreds of people download the trojan Nmap installer every week! So the first order of business is to notify the community so that nobody else falls for this scheme. Please help spread the word. Of course the next step is to go after C|Net until they stop doing this for ALL of the software they distribute. So far, the most they have offered is: 'If you would like to opt out of the Installer you can submit a request to All opt-out requests are carefully reviewed on a case-by-case basis.' In other words, 'we'll violate your trademarks and copyright and squandering your goodwill until you tell us to stop, and then we'll consider your request 'on a case-by-case basis' depending on how much money we make from infecting your users and how scary your legal threat is. F*ck them! If anyone knows a great copyright attorney in the U.S., please send me the details or ask them to get in touch with me. Also, shame on Microsoft for paying C|Net to trojan open source software! Cheers, Fyodor

Close news item >>

Happy Holidays from ISW - 2011-11-28
Close the expanded news item to expand this news item.
Information Security Writers wishes everyone, everywhere, a very happy holiday season! Be safe and secure!

Now on Twitter - 2011-11-28
Close the expanded news item to expand this news item.
Follow us on Twitter. Get site updates, news flashes and etc. Tweet: infosecwriters

Here Kitty Kitty Kitty - 2010-06-22
Close the expanded news item to expand this news item.
For those that saw the kitty, I found it entertaining, and hope you did too. Remember, we are a free site with people contributions. There is no confidential information, we dont sell anything, and there is nothing of value here. I did enjoy the kitty though!

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.