Vanish Security News VeriSign iDefense
vanish.org
Anonymity
Privacy
Security

Internet Threat Sources


Hack Attack Map from vanish.org


DShield displays a geographic distribution map of attack sources.
DShield.org is an attempt to collect data about hacker activity from all over the internet.
This data will be cataloged and summarized.
It can be used to discover trends in activity and prepare better firewall rules.




Phishing and Crimeware Map
The Phishing and Crimeware map displays the most recent data collected by Websense Security Labs and provides a historical look into where Phishing and Crimeware related websites are hosted on the Internet. Upon discovery, each site is looked up via its IP Address to track the country of origin through the appropriate IP registrars and plotted on the map. The data is updated approximately 15 minutes after discovery.




Symantec DeepSight Threat Management System
Symantec DeepSight Threat Management System provides actionable intelligence covering the complete threat lifecycle, from initial vulnerability to active attack. With personalized notification triggers and expert analysis, the system enables enterprises to prioritize IT resources in order to better protect critical information assets against a potential attack. Patches, countermeasures, workarounds, and additional references are also provided, reducing the hours spent searching through Web sites and emails. Optional custom reports provide the ability to trend data by time, country, industry, IP address, target ports, and other parameters. Powered by the Symantec Global Intelligence Network, the service is an authoritative source of tailored information about known and emerging vulnerabilities, threats, risks and global attack activity.




Security Surfer
The Security Surfer Threat Map is a tool showing a graph resulting from the tracking analysis of spam activity spread by compromised machines [bots or zombies] on global level. Everyday hundreds of thousands of spam emails are sent by vulnerable and compromised machines which together define the so-called botnets owned and commanded by cyber-criminals. Each Blue-Pin represents an active bot on Internet.




SANS Internet Storm Center
SANS Internet Storm Center – A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.



Vanish.Org Copyright © 2006 All rights reserved