Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
HI Momentum_Trader, Agreed! :)
Eagle1,
Shakerzz, It was a Great Weekend! Thanks!
Eagle1,
Good Morning MOMO and MOMOs!
Beautiful Day Today!
Eagle1,
Thanks MOMO...
Hey did you get my PM?
Thanks!~
Eagle1,
Welcome rkentsmith! God Bless You!
Keep having those discussions and remember, be careful what you ask for :)
Eagle1,
Posted by: rkentsmith
In reply to: imgunnaretire who wrote msg# 843 Date:10/21/2006 11:48:19 PM
Post #of 854
Faith is my department as talks continue with the powerful and influential....
Welcome Aboard One Time! Your right, IMO, Exobox is a no brainer. How did you find us here?
One would think that OSR is critiquing the Exobox Technology to work fully with Windows. Read this PR from Exobox about OSR from November 28, 2005.
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Note that the Software developement plan (White Papers) has been done by OSR as promised in this PR around April 2006...hmm...they do what they say, so I take them very serious...IMO.
EXBX White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Furthermore, according to the SEC filings and PR from November 2005, I believe that Milestones are being accomplished as stated from Exobox!
We are patiently awaiting the next move! FSGeek had a good post about the patents and I suspect that Osha Liang LLP is working hard for Exobox as one of the best in the business.
Osha - Liang is an internationally reconigized intellectual property firm with offices in Houston, Texas, Silicon Valley, California, and Paris, France. The firm provides expertise in all matters pertaining to the acquisition, licensing, and enforcement of intellectual property rights.
All is needed is some nice TLC for Exobox!! as...IMO...they have so seriously and strategically planned their work and they are working their plan.
Sorry if my exuberance is displayed, but I cannot find anything negative about this company and I do challenge anyone to do so.
Have a Good one!
Eagle1,
P.S. Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft.
Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today.
Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Exobox's unique approach to network security provides an unrivaled level of security, coupled with the addition of significant, revolutionary features that other network security products fail to provide.
Exobox’s Technology has been evaluated and received the validation of several sources, including the National Institute of Standards and Technology and OSR Open Systems Resources, Inc., the world leader in low-level manipulation of the Windows operating system
Got EXBX?
IMO, EXBX is so very potent and they say this so many times in PRs and SEC filings that it is almost unreal!
TD Ameritrade and E-Trade reimbursed customers for their losses in what appears to be an industrywide plague. The trend coincides with data that security software maker Symantec (Nasdaq: SYMC) released last month: hackers are increasingly turning their attention to financial services firms.
In fact, according to Symantec's latest Internet Security Threat Report covering new and ongoing security threats from Jan. 1, 2006 through June 30, 2006, financial services businesses were most heavily targeted by phishing attacks, with those firms' sites sites accounting for 84 percent of all phishing-targeted sites Symantec tracked.
The Federal Bureau of Investigations and the Securities Exchange Commission are investigating the brokerage fraud cases, but neither organization was immediately available for comment.
A Deeper Issue
Identity theft is still the chief concern among consumers contacting the Federal Trade Commission . However, the greater risk to falling victim to identity thieves occurs offline.
Indeed, headlines may talk of phishing e-mails, keylogging software and database breaches, but more than 90 percent of identity fraud starts offline in the form of misplaced passwords, stolen bank statements and other paper documents, according to Javelin Strategy & Research.
A 2005 Javelin survey reveals that for half of the victims of identity-based fraud who knew where their information had been obtained, the most common source was a "lost or stolen wallet, checkbook or credit card."
The Big Picture
Spotlight on Security
Subscribe Today"Clearly, people still need to be careful in all of their dealings, but the largest area of risk is still paper-based risk and it's friends and family and people you know," Anne Wallace, executive director of the Identity Theft Assistance Center, told the E-Commerce Times.
"The key message for consumers is really to think about your personal information as money because it is in a sense," she continued. "Identity thieves access to your assets comes through personal information."
In the grand scheme of risk management, Wallace is concerned that consumers may not be focusing on where the real risks are, which could cause identity theft rates to continue rising. With Javelin reporting that victims of identity theft lost a collective $56.5 billion last year, that's not good news for consumers, financial service firms, or the agencies who insure them.
Things are progessing finally...hey?
Bancorp International Group Announces Success of 15c 211 Application
via COMTEX
October 27, 2006
LONDON, Oct 27, 2006 (PrimeZone Media Network via COMTEX News Network) --
The 15c 211 application submitted on BCIT's (OTCBB:BCIT) behalf has been successful.
The Company will be making a further announcement at the beginning of the week commencing Monday 30th October 2006 with further news of this development.
Until this second announcement, the appointed company transfer agents, Pacific Stock Transfer, have been instructed not to take any calls from shareholders and other parties relating to this matter as they are not in a position to give any information at this time.
Until this second announcement please contact the following number for enquiries: 0044 7961 992 681. Again BCIT would like to emphasize there should be no contact with the company transfer agent.
This news release was distributed by PrimeZone, www.primezone.com
SOURCE: Bancorp International Group Inc.
Bancorp International Group, Inc. Thomas Megas, CEO 001 44 7961 992 681
(C) Copyright 2006 PrimeZone Media Network, Inc. All rights reserved.
E*Trade, TD Ameritrade Hacked...
E*Trade, TD Ameritrade Are Targeted in Online Brokerage Fraud
By Bradley Keoun
Oct. 23 (Bloomberg) -- Customer accounts at online brokers including E*Trade Financial Corp. and TD Ameritrade Holding Corp. have been infiltrated by computer hackers in Eastern Europe and Asia in one of the biggest cases of identity theft to strike the U.S. securities industry.
The Federal Bureau of Investigation, the Securities and Exchange Commission and the NASD are trying to unravel the fraud, which has cost New York-based E*Trade at least $18 million and caused losses at Ameritrade of Omaha, Nebraska, company officials said. In one ``pump-and-dump'' scheme the SEC uncovered, thieves used customers' money to drive up the prices of little-traded stocks and then sold shares they bought earlier at a profit.
``The perpetrators were more organized, and it was a bigger issue this quarter than it had ever been before,'' E*Trade Chief Operating Officer Jarrett Lilien said in an interview. ``It wasn't just hitting one company, it was hitting everybody.''
The case shows how criminals who ply the Internet from countries beyond the reach of U.S. law enforcers are turning to financial markets to commit fraud. Online brokers are a growing target for identity theft, a crime that in all its forms will cost Americans $56.6 billion this year, according to Javelin Strategy & Research of Pleasanton, California, which has prepared similar estimates for the Federal Trade Commission.
``Identity thieves appear to be directing increased attention to the securities business, and their attacks are growing in sophistication,'' said John Walsh, chief counsel in the SEC's office of compliance inspections and examinations, at an industry conference in Phoenix on Oct. 5.
Customers Compensated
E*Trade disclosed on a conference call last week that it spent $18 million in the third quarter to compensate customers affected by trading fraud. The company, the fourth-largest discount broker by assets, is cooperating with the federal investigation and the probe by the NASD, E*Trade spokeswoman Pam Erickson said. NASD is the industry's self-regulator for more than 5,100 brokerages.
TD Ameritrade, the third-largest online broker, also suffered losses because of bogus trading by unauthorized users who pried their way into customer accounts, said spokeswoman Katrina Becker. She declined to specify an amount. TD Ameritrade may provide more details tomorrow when it reports fiscal fourth- quarter earnings.
Charles Schwab Corp., the biggest online broker, didn't experience ``anything unusual enough to warrant a financial disclosure,'' said spokesman Glen Mathison. The San Francisco- based company reported earnings on Oct. 16. Adam Banker, a spokesman for closely held Fidelity Investments of Boston, the second-largest discount broker, declined to comment.
`Global Problem'
E*Trade Chief Executive Officer Mitchell Caplan told investors that investigators traced the illicit trading to ``concerted rings'' in Eastern Europe and Thailand. The company hasn't determined whether the reimbursement costs will be covered by insurance, he said. TD Ameritrade also was targeted by cyber- criminals in Eastern Europe and Asia, spokeswoman Becker said.
``Internet crimes that result in the theft of personal and financial data from consumers continue to be a significant and global problem,'' FBI spokesman Paul Bresson said. ``We work closely with our foreign law-enforcement counterparts to pursue these cases with all applicable laws.''
Bresson declined to comment on the FBI investigation. John Heine, a spokesman for the SEC, and NASD's Herb Perone also declined to comment.
Some of the losses were straight theft. In his presentation, Walsh of the SEC explained how criminals use personal information such as Social Security numbers to break into accounts. Once in control, they loot the accounts by selling securities and wiring out the proceeds far from the U.S.
`Pump and Dump'
The online version of the ``pump-and-dump'' fraud sets off few security alerts at brokerage firms because no money is withdrawn from the compromised accounts, Walsh explained.
``This is an increasingly popular variation,'' he said in Phoenix. ``If you are looking for a single `hot topic' in the world of identity theft, this is it.''
In ``alias fraud,'' a thief opens an account in an individual's name, then uses it for illegal trading or money- laundering. Because the victim's name is on the account, he or she appears responsible for the crimes.
Walsh said the SEC recently began a ``sweep examination'' of brokerage firms to determine if they have adequate technology and staff training to prevent and detect online fraud.
``This thing is so widespread and has such a significant impact on the industry at large,'' E*Trade's Caplan said. `You're going to end up seeing structural changes in the industry.''
Reducing the Fraud
Caplan told investors E*Trade reduced the fraud to ``almost zero'' in the past three weeks after beefing up security for electronic trading. The company declined to say how many accounts were infiltrated or explain the security enhancements.
While the Federal Deposit Insurance Corp. covers bank accounts against fraud or insolvency for as much as $100,000, brokerages get no such protection.
E*Trade promised in January that it would reimburse customers for any losses due to fraud in an effort to allay concerns about trading over the Internet or keeping cash in online bank accounts. TD Ameritrade and Schwab offered similar guarantees in February and Fidelity followed in May.
To contact the reporter on this story: Bradley Keoun in New York at bkeoun@bloomberg.net .
Last Updated: October 23, 2006 00:04 EDT
http://quote.bloomberg.com/apps/news?pid=20601087&sid=a0tTA2Ko30As
Hi Imgunnaretire! Hope that you are having a great weekend too! Patient Exobox Shareholders are awaiting good news and if you feel it in your bones, then that is a great sign.
As for EXBX coming off the SHO list and never returning? Well, I must say that is one heck of a Good Sign. The naked shorting crooks had better keep their hands off this one.
Don't you really like this PR?
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
Business Wire, Nov 28, 2005
HOUSTON -- Exobox Technologies Corp. (Pink Sheets:EXBX), a network security company with a proprietary software designed to stop all cyber threats, announced today that it has executed an engagement agreement with Open Systems Resources, Inc ("OSR") to adapt Exobox's software to the Windows operating system.
OSR consultants know the Windows system better than any other programmers in the industry making OSR the world leader in low level manipulation of the Windows environment.
OSR has already examined and validated Exobox's underlying technology and has agreed to write Exobox's commercial software development plan for Windows.
Under their agreement with Exobox, effective October 26, 2005, OSR also has agreed to develop and provide Exobox a commercially viable product for Windows within 11 months, for a turnkey fee, once it has completed the software development plan.
Robert B. Dillon, Exobox's President and Chief Executive Officer, commented, "OSR is dedicated to developing new tools that expand on Windows functionality and we are pleased to be able to engage the quality of experts at OSR in adapting our software to Windows.
The completion of our software development plan for Windows is the key to Exobox's business plan and will allow Exobox to generate revenue through the licensing of our products, once OSR completes the plan."
Exobox was formed to provide software security that protects against all cyber threats to individuals, corporations and government agencies.
The Company's lead product is a revolutionary patent protected software that is immediately available for commercialization.
Exobox technology is like bulletproof glass in that it is virtually 100% effective in protecting against the daily cyber threats targeting Internet users, such as viruses and worms which can destroy documents and computer programs, and spyware which is used to gather personal information without the user's knowledge, increasing the risk for identity theft.
--------------------------------------------------------------
Here is the software Development plan that was done by OSR for Exobox, per contract around April-May 2006 and as promised by OSR and Exobox.
EXBX White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox will generate revenue through the licensing of their products.
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft.
Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today.
Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
Competition
On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by 42 companies, the spy ware removal technology currently available from 11 companies and the spy ware prevention solutions offered by 14 companies fare no better.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Exobox's unique approach to network security provides an unrivaled level of security, coupled with the addition of significant, revolutionary features that other network security products fail to provide.
Have a good one!!
Eagle1,
HI BigBoyz!! FYI, Exobox = EXBX ...
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft.
Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today.
Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Eagle1,
~Powerful Statements by Exobox via SEC Filings~
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft.
Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today.
Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
Competition
On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by 42 companies, the spy ware removal technology currently available from 11 companies and the spy ware prevention solutions offered by 14 companies fare no better.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Now if that isn't powerful, I don't know what is...
Eagle1,
Good Morning Everyone! Have a Happy Saturday! :)
Eagle1,
This new 8-k shows that the OS will not being going as high as we thought it would once the prefered shares are to be converted to common shares.
The bottom line is, this new ammended 8-K 10/13/06 clearly states that the new conversion rate(s) has been lowered compared to the old conversion rate(s) for the prefered share conversion to common shares.
This ultimately will make the common share OS lower since the Conversion rate has been lowered... to me, this is a Great Sign.
Lower operating shares, means potentially higher and more explosive PPS when good news comes. This also will leave more options on the table for the future.
With this latest 8-K, there is no doubt something is cooking up in the Exobox kitchen and it sure smells real good to me!
Have a Great Weekend!
Eagle1,
imgunnaretire, I second that friend!
God Bless!
Eagle1,
HI Surgeon1, I'll take a shot at answering your questions.
Q: Why did this stock go from $22 in january to $0.30 - 0.40 now?
A: Since the stock is currently trading in the grey market it is a target of manipulation. Market makers can and will take full advantage of the current situation to funnel money out of investors as the Grey market is the wild west of the market IMO. Sorry MM's but that is what I see here, of course IMO. Take a look at wide spreads and there is more to it than that...IMO. We need to move out of these Greys and the good news is that there has been a market maker that has filed a form 15c211 for EXBX to be quoted on the OTCBB. This tells me we are on a serious track to success....
Q: Does anyone realy think it will back up to it was late last year?
A: Exobox has some great verifiable facts in place that points to the Exobox Team being Serious and there are many extreme milestones that have been accomplished. Personally, I anticipate that more milestones will be accomplished. In a nutshell, and IMO, they are doing EXACTLY what they said they would do...so yes I do.
Q: Sounds like a great product - is it ever going to become available to the public (more importantly - internet based business)? When?
A: At the links below, go to the White Paper overview that Exobox has provided from their site. It has a great deal of information that explains many things about the Suez and SOS Products to be released. From what I can tell from the SEC filings, their first line of product will hit the market no later than March-April 2007.
EXBX Profile & Description:
http://www.exoboxtech.com/Company%20Profile.pdf
EXBX White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
The Enterprise Solution currently being developed for anticipated licensing in 2006 represents the first in a line of SUEZ based products from Exobox.
Exobox Management “expects” that EXOBOX’s Technology will soon be generally acknowledged as the “Disruptive Technology of Choice” for the Network Security Industry.
Hope this helps!
Eagle1,
P.S. Pay Special Attention to this information about the Competition from the SEC filing link below.
Competition
On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by 42 companies, the spy ware removal technology currently available from 11 companies and the spy ware prevention solutions offered by 14 companies fare no better.
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft.
Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today.
Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Exobox's unique approach to network security provides an unrivaled level of security, coupled with the addition of significant, revolutionary features that other network security products fail to provide.
Exobox’s Technology has been evaluated and received the validation of several sources, including the National Institute of Standards and Technology and OSR Open Systems Resources, Inc., the world leader in low-level manipulation of the Windows operating system
Networking snafu gums up Microsoft security patches
Robert McMillan
October 11, 2006 (IDG News Service) -- Networking problems kept Microsoft Corp. from distributing its latest security patches to users of its automatic update services.
The updates, released at about 11 a.m. Pacific time on Tuesday, fix a whopping 26 vulnerabilities in Windows, Office and the .Net framework. Many of these flaws are considered critical, but as of 2 p.m. Tuesday they were still unavailable via many of Microsoft's most popular update services.
The problem was due to "some network issues on the Microsoft Update platform," according to Microsoft's Craig Gehere, who wrote about the issue in a blog posting. That posting can be found here.
The security updates were not available to users of Microsoft Update, Automatic Updates, Windows Server Update Services (WSUS), and Windows Update, version 6, Gehere said.
Microsoft Update users trying to use the service to check for high-priority updates, for example, were told, "The Web site has encountered a problem and cannot display the page you are trying to view."
Users of Software Update Services (SUS), Windows Update version 4, and Office Update were not affected by the glitch, Gehere said.
Gehere said yesterday that the networking problems should be fixed by the end of the day. "Technical teams are engaged and have been working around the clock to resolve this problem," he wrote.
A spokesman with Microsoft's public relations firm could not say exactly what had caused the update services to fail.
The snafu came at a difficult time for Microsoft users. These latest security updates address the largest number of vulnerabilities in recent memory, and hackers are already known to be exploiting three of the bugs. During the past few weeks, attack code has been spotted that exploits critical flaws in the Windows operating system, Word and PowerPoint, all of which were patched Tuesday.
Customers can go to Microsoft's Security Bulletin pages and manually download their updates from the links in the 10 bulletins Microsoft has issued. Those bulletins can be found here.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=networking&...
Hackers Target Commerce Dept. Computers
October 9, 2006
By Roy Mark
Chinese hackers are deviling the U.S. Department of Commerce, forcing the agency to replace workstations and bar employee use of the Internet from their own work computers.
The targets of the attacks were computers in the Bureau of Industry and Security (BIS), which oversees a number of commercial U.S. exports having both commercial and military uses, including software and technology.
No data was compromised in the attacks, according to the agency.
"The BIS discovered targeted efforts to gain access to BIS user accounts," a spokesman for the agency told internetnews.com. "There is no evidence BIS data has been compromised."
A source familiar with the attacks said, "Some of the URLs were listed as Chinese Internet service providers."
The attacks were discovered over the course of last summer. The BIS, according to the agency spokesman, took a "series of action steps" to protect sensitive data.
The BIS replaced workstations and since Sept. 1, employees are not allowed to access the Internet from their work computers. Instead, the BIS established Internet access for employees on computers not connected to the BIS network.
In fiscal year 2004, China was the destination of the largest number of approved export licenses.
Last month, the Commerce Department, which has been frequently criticized for its security, announced more than 1,100 laptops are missing from the agency, based on an inventory survey dating back to 2001.
This article was first published on InternetNews.com. To read the full article, click here.
Hi Everyone. A quick note. I am patiently awaiting Exobox to accomplish its next milestones. Many milestones have been accomplished and you can see that they are doing what they said they would do. From the filings you can see that the first product should hit the market no later than March-April 2007.
The NASD OTCBB compliance has confirmed on many occasions that there is an open form 15c211 there. This means that a Market Maker has filed a form15c211 at the OTCBB for quotations of EXBX. This confirms, at least to me, that we are on a serious track to success. The NASD will not tell investors, like me, details concerning why its taking as long as it takes, but personally I am confident that we are on track. They will confirm that there is an open form 15c211 under review.
I have not wavered and I am 1000% behind this Company, its Products and its Management Team.
Have not posted much because there really is nothing new to discuss.
There still has not been one negative thing that I can find out about this company....hence to me, is a GREAT Sign!
Everyone have a Great Weekend and just Relax, EXBX is a serious Winner IMO!
Eagle1,
EXBX Volume today, a total of 5.01 k LMAO.
Wowsers! Who is selling>?>>>LOL
I love the way this stock is setting up!
Anyone Filling here?
Eagle1,
Firehawk, whats kicking here?
Nice to see you back friend!
Eagle1,
HI Fire, sorry that last post was not for you.
We are still awaiting the NASD.....no worries here.
Nice to see you back...how is everything friend?
Eagle1,
Read and you may see the light..LOL
Eagle1,
NICE NICE NICE>>>
This stock is proving to be very impressive!
Setting up very nice!
Eagle1,
Symantec: 'There is no safe browser'
Monday, September 25, 2006
http://www.snpx.com/cgi-bin/news55.cgi?target=162606931?-11434
According to Symantec's twice-yearly Internet Security Threat Report, hackers found 47 bugs in Mozilla's open-source browsers and 38 bugs in Internet Explorer (IE) during the first six months of this year.
That's up significantly from the 17 Mozilla and 25 IE bugs found in the previous six months.
Even Apple's Safari browser saw its bugs double, jumping from six in the last half of 2005 to 12 in the first half of 2006. Opera was the only browser tracked by Symantec that saw the number of vulnerabilities decline, but not by much. Opera bugs dropped from nine to seven during the period.
And while Internet Explorer remained the most popular choice of attackers, no one is invulnerable. According to the report, 31 percent of attacks during the period targeted more than one browser, and 20 percent took aim at Mozilla's Firefox.
"There is no safe browser," said Vincent Weafer, senior director with Symantec Security Response. "If you've got a browser, make sure you're configuring it correctly," he added. "That's a far better strategy than running some browser just because you haven't heard of it."
Part of the rise is due to the growing market for vulnerabilities, Weafer said. Legitimate companies such as 3Com's Tipping Point and Verisign' s iDefense pay for this information, and there is also a growing black market for exploits. "People are encouraged and getting money for finding vulnerabilities, so now you have more people looking," said Weafer.
Browser bugs are also relatively easy to find and exploit, said Marc Maiffret, chief technology officer with eEye Digital Security. "Everyone has realized that targeting the applications on the desktop is a better way to break into businesses and consumers and steal things than server flaws," he said via instant message.
Thanks CAT!!!
Eagle1,
Hackers target home users for cash
http://www.theregister.co.uk/2006/09/25/symantec_threat_report/
'It's war out there' says Symantec report
By John Leyden → More by this authorPublished Monday 25th September 2006 17:20 GMTFree whitepaper - SafeNet Metro Ethernet Executive Brief Consumers are now on the main target of malicious hackers intent on enriching themselves through the misery of others. Vulnerabilities in desktop applications and the increased use of stealth techniques are on the rise among members of the digital underground, according to the latest edition of Symantec's Internet Security Threat Report.
The report, which covers the first half of 2006, suggests that consumer security protection is weak, leaving Joe Public easy prey to identity thieves, botnet herders and other financially motivated criminals. Crackers are using a variety of techniques to escape detection and remain on infected systems for longer. Symantec reckons assaults against consumers account for 86 per cent of all targeted attacks. Banks and other financial sector organisations are the second most prevalent target for internet attacks. Phishing attacks almost doubled during the reporting period.
The first six months of 2006 saw a continuation of the trend of large, widespread internet worms giving way to smaller, more targeted attacks focusing on fraud, data theft, and criminal activity. Client-side applications such as web browsers and email clients are popular attack targets.
Vulnerabilities affecting Web applications accounted for 69 per cent of all vulnerabilities documented by Symantec in the first half of 2006. Flaws in web browsers were particularly prominent in this mix with 47 vulnerabilities documented in Mozilla browsers (compared to 17 in the last reporting period), 38 in Microsoft Internet Explorer (compared to 25 in 2H05), and 12 in Apple Safari (compared to six in 2H05). Symantec fails to say how many of these vulnerabilities are serious, so direct comparisons may be misleading.
Ollie Whitehouse, Symantec research scientist and one of the authors of the report, told El Reg that the company didn't classify in the report how many of these vulnerabilities might be used to inject hostile code, as opposed to simply crashing browsers.
Hide and seek
In the first half of 2006, 18 per cent of all malicious code samples detected by Symantec had not been seen before, indicating that hackers are trying harder to evade detection by signature-based anti virus and intrusion prevention systems.
Phishers are also attempting to bypass filtering technologies by creating multiple randomised messages. In H1 2006, 157,477 unique phishing messages were detected, 81 per cent more than the previous six months. The financial services sector was the most heavily phished, accounting for 84 per cent of phishing sites tracked by the Symantec.
Spam accounted for just over half (54 per cent) of monitored email traffic, slightly up from 50 per cent in 2H05. Malware authors are increasingly trying to tempt users into web sites hosting malicious code as opposed to burying viruses within infectious attachments, where hostile code is more likely to be blocked.
Networks of compromised PCs remain a lucrative resource for hackers. These bot networks can be used not only to spread malicious code, but to send spam or phishing messages, download adware and spyware, launch denial of service attacks, or harvest confidential user information.
Symantec identified more than 4.6m active bot network computers and observed an average of 57,717 active bot network computers per day during the first half of 2006. During the reporting period, the IT security firm observed an average of 6,110 denial of service attacks per day, a big increase from the 1,402 DoS attacks per day it recorded in the last six months of 2005. Just over half (54 per cent) of these attacks were thrown at US-based systems. ISPs bore the brunt of the onslaught.
Future imperfect
Other financially motivated attacks use modular malicious code, malware that updates itself or downloads more aggressive threat components onto compromised PCs once it gains a foothold. During the first half of 2006, modular malicious code accounted for 79 percent of the top 50 malicious code samples reported to Symantec. Malicious code samples capable of exposing confidential data represented 30 of the top 50 samples seen be the security firm.
Symantec predicts that virus writers will resurrect polymorphic virus techniques in a bid to escape detection by anti-virus filters. It also reckons hackers will apply "Web 2.0" concepts such as user-based publishing and technologies like AJAX in internet attacks.
Symantec documented 2,249 new vulnerabilities in the first half of 2006, an increase of 18 per cent over 2H05 and the highest volume of vulnerabilities recorded for any reporting period so far. Fuzzers, programs or scripts designed to find vulnerabilities in software code, will raise the vulnerability count even further.
On a more positive note, vendors are releasing software patches more quickly. The window of exposure for enterprise vendors and web browsers was 28 days, down from 50 days in the previous period. Microsoft Internet Explorer had an average window of exposure of nine days (down from 25), Apple Safari at five days (up from zero), Opera at two days (down from 18), and Mozilla at one day. These figures down take into account the effect of the latest, unpatched IE exploits might have on statistics.
For the first time, Symantec also looked at how long operating system vendors take to patch security bugs. Sun had the longest patch release time with 89 days followed by HP with 53 days. Apple took an average of 37 days while Microsoft and Red Hat had the lowest average patch release times of 13 days apiece. ®
Elliot Wave in Effect here?
Eagle1,
As we know, actions speak louder than words! The actions of the Exobox Team have spoken loud and clear and I do believe that many will agree.
Have a Great Weekend Exobox Shareholders!
Eagle1,
P.S. *EXBX has Serious Strategic Alliances.
http://www.exoboxtech.com/alliances.html
Do review the following –
EXBX Profile & Description:
http://www.exoboxtech.com/Company%20Profile.pdf
EXBX White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
The Enterprise Solution currently being developed for anticipated licensing in 2006 represents the first in a line of SUEZ based products from Exobox.
Exobox Management “expects” that EXOBOX’s Technology will soon be generally acknowledged as the “Disruptive Technology of Choice” for the Network Security Industry.
Competition
On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by 42 companies, the spy ware removal technology currently available from 11 companies and the spy ware prevention solutions offered by 14 companies fare no better.
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft. Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today. Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Everyone have a Great Weekend! EXBX on Supertrack to Success IMO!
I have not wavered from my position and have not sold one share.
Exobox, via SEC filings, is acheiving the milestones it promised to shareholders and make NO doubt about it, I'm 1000%+ behind this play.
I trust what I see and I trust my DD on this company.
Shareholders are patiently awaiting our Beloved Exobox, from its already validated technology, to explode on the marketplace as the “Disruptive Technology of Choice”for the Network Security Industry!
Eagle1,
P.S. EXBX Profile & Description:
http://www.exoboxtech.com/Company%20Profile.pdf
EXBX White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
The Enterprise Solution currently being developed for anticipated licensing in 2006 represents the first in a line of SUEZ based products from Exobox.
Exobox Management “expects” that EXOBOX’s Technology will soon be generally acknowledged as the “Disruptive Technology of Choice” for the Network Security Industry.
Competition
On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by 42 companies, the spy ware removal technology currently available from 11 companies and the spy ware prevention solutions offered by 14 companies fare no better.
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft. Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today. Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Exobox's unique approach to network security provides an unrivaled level of security, coupled with the addition of significant, revolutionary features that other network security products fail to provide.
Any questions?
Exobox’s Technology has been evaluated and received the validation of several sources, including the National Institute of Standards and Technology and OSR Open Systems Resources, Inc., the world leader in low-level manipulation of the Windows operating system
Welcome miamitan!
Eagle1,
SEC Urged To Do More To Counter Naked Short-Sales
09/21/2006
Dow Jones News Services
(Copyright © 2006 Dow Jones &
Company, Inc.)
By Judith Burns
Of DOW JONES NEWSWIRES
WASHINGTON (Dow Jones)--The Securities and Exchange Commission should do more to attack abusive short selling, including tighten stock-borrowing requirements and require daily reporting on the extent of stock-delivery failures, some lawmakers and business executives say.
"We believe that naked short selling continues to be a serious problem for a number of public companies," the U.S. Chamber of Commerce wrote in a Sept. 13 letter to the SEC.
Short sellers sell borrowed shares in hopes they can profit by replacing them later at a lower price. "Naked" short sellers do not borrow shares they sell short and may have no intention of doing so, which some liken to counterfeiting.
The chamber said the practice is especially painful for smaller start-ups whose shares are more easily manipulated and called for stricter requirements to locate shares before engaging in short sales and daily reporting of stock-delivery failures for hard-to-borrow "threshold" securities. It also urged the SEC to study the stock-lending market and remove barriers that make it hard to lend shares out of cash accounts.
Taser International Inc. (TASR), the Scottsdale, Ariz., stun-gun maker, agrees the SEC needs to tighten Regulation SHO, its 2004 rule package targeting short selling. In a Sept. 18 letter to the SEC, Taser said it has seen "substantial evidence of market manipulation through abusive naked short selling," including delivery failures, noting that one day in 2005, when short sale trading volume in its stock was 19 million shares, about 45% were not delivered.
Over-voting is another problem, according to Taser. It said 82 million votes were recorded at its 2005 annual meeting, even though the company had only about 61 million shares outstanding, suggesting the creation of 20 million "phantom shares." Over-voting declined to about 10 million shares this year, demonstrating there are lingering problems in this area, Taser executives wrote.
This summer, amid criticism that Regulation SHO hasn't stopped naked short selling, the SEC proposed changes to it, including eliminating a controversial "grandfather" provision that exempted previously existing short sales from stricter rules on borrowing and delivering shares. If the proposal is finalized, transactions with pre-existing stock delivery failures that had been "grandfathered" would have to be closed out within 35 days after the change takes effect.
Ending "grandfather" protections is a good idea, according to many of the comment letters to the SEC, which sought public reaction to the plan through Tuesday.
"Grandfathering must be eliminated," Utah Gov. Jon Huntsman Jr. wrote in a Sept. 8 letter. He also supported the SEC's proposal to end exceptions for options market makers, saying they should be required to deliver shares promptly after the underlying options trades have expired.
Utah's governor joined others, including Utah Attorney General Mark Shurtleff; Rep. Jim Matheson, D-Utah, Rep. Rick Renzi, R-Ariz.; and Overstock.com Inc. (OSTK) Chief Executive Patrick Byrne in calling for changes beyond those proposed by the SEC, including requiring short sellers to have shares - or have written contracts to borrow them - prior to short sales.
Currently, short sellers only need reasonable grounds to believe that shares can be borrowed, which "amounts to an enormous loophole" that is being exploited by abusive short sellers to avoid borrowing or delivering stocks they sell, wrote Byrne. He said tighter borrowing rules would go a long way toward solving that problem. Alternatively, he suggested borrowed shares be placed in a separate pool that precludes them from being lent again until the trade has settled, avoiding over-borrowing and over-voting.
Byrne, the Salt Lake City online discount retailing executive, has been a vocal critic of the SEC and Wall Street brokerage firms, and says he's uniquely positioned to weigh in on Regulation SHO. He noted that with a 20-day break, since January 2005, Overstock has been on the "threshold" list of shares experiencing delivery failures for at least five consecutive days.
Overstock wasn't able to get information on the extent of the problem, and Byrne wants regulators to require a daily public tally of delivery failures in all hard-to-borrow threshold stocks. He said that without that, "it is difficult to know the level of 'naked shorting' and its risk to the capital markets."
If the SEC can't deliver a national solution, Francine Giani, executive director of Utah's Department of Commerce, warned in her own letter that Utah "will increase its efforts to identify those firms causing settlement failures and when justified, bring enforcement action."
-By Judith Burns, Dow Jones Newswires, 202-862-6692; Judith.Burns@dowjones.
com
(END) Dow Jones Newswires
09-21-06 1437ET
Copyright (c) 2006 Dow Jones & Company, Inc.
----------------------------------------------------------------
IMO, the SEC is cracking down on this problem!
Eagle1,
Hi XCaptin...agreed. Massive volume today hey? like 12K worth...LOL
Exobox is unrivaled, so what would that do to the PPS?
I'm going to put some things together and will post it later...
Success is Ours...IMO!
Eagle1,
P.S. Exobox's unique approach to network security provides an unrivaled level of security, coupled with the addition of significant, revolutionary features that other network security products fail to provide.
The Enterprise Solution currently being developed for anticipated licensing in 2006 represents the first in a line of SUEZ based products from Exobox.
Exobox Management “expects” that EXOBOX’s Technology will soon be generally acknowledged as the “Disruptive Technology of Choice” for the Network Security Industry.
Competition
On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by 42 companies, the spy ware removal technology currently available from 11 companies and the spy ware prevention solutions offered by 14 companies fare no better.
Exobox technology is 100% effective against viruses and also stops Trojan activity and Identity theft. Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today. Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
http://yahoo.brand.edgar-online.com/fetchFilingFrameset.aspx?FilingID=4085384&Type=HTML
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers
EXBX Moving in on 100 MA...Chart by MOMO.
http://www.investorshub.com/boards/read_msg.asp?message_id=12445951
Users Wonder If Microsoft Exec's Security Claims Are Trustworthy
Jaikumar Vijayan Today’s Top Stories or Other Security Stories
September 11, 2006 (Computerworld) -- BOSTON -- Since Microsoft Corp. launched its Trustworthy Computing initiative in January 2002, the company has substantially improved the security of its products, its security chief said here last week.
However, some Microsoft users at The Security Standard conference were less charitable in their assessment of the company's progress. Most of those attendees concluded that it's too soon to deliver a verdict on Microsoft's security efforts.
During a panel discussion, Ben Fathi, corporate vice president of Microsoft's security technology unit, gave the security capabilities of today's Microsoft products a grade of B+. Five years ago, he said, that grade would have been a C- or a D.
The improvements are the result of a "cultural shift" at Microsoft sparked by the Trustworthy Computing memorandum that Chairman Bill Gates issued nearly five years ago, Fathi said.
Since then, the company has completely overhauled its product development processes, and it has trained developers to write secure code, Fathi explained. The initiative prompted the creation of the Software Development Lifecycle (SDL), a security-focused quality-control process that's now used for every software product developed at Microsoft.
"Last year, we had over 300 products that went through this, and with three exceptions, they all passed," Fathi said. The products that failed were blocked from release until the development team fixed the problems or found a way to mitigate them, he said.
"Vista is the first product that has gone through SDL from inception to end," Fathi noted. As a result, he said, "there is a whole lot of improvement to security in the product" compared with earlier products.
Users at the conference were skeptical of that claim, noting that it will take time for Microsoft to demonstrate that products such as Vista are indeed more secure.
Mark Olson, manager of information security at Beth Israel Deaconess Medical Center in Boston, said that so far at least, Microsoft appears to be on the right track with its Trustworthy Computing initiative. However, he also noted that the health care organization has yet to deploy any products built using Microsoft's SDL process.
"Until [such a product] is deployed and we have a solid 18 months of runtime, I won't know for sure if they have gotten any better," Olson said, adding, "It's wise to be wary of sales pitches."
Still, he noted, Microsoft's patch release process and its efforts to develop tools such as its rootkit detector have been positive steps.
Holding Off
Marcin Czabanski, chief security officer at Medical Network One, a Rochester, Mich.-based provider of managed health care services, said he is taking a "wait and see" approach to determining whether the security of Microsoft products has truly improved, as the company claims.
"There have been a lot of improvements of their processes, and their products are more stable," Czabanski said.
Even so, Medical Network One plans to hold off on deploying Microsoft's upcoming Windows Vista operating system across the enterprise until there is reasonable evidence that it's secure.
Czabanski also suggested that Microsoft needs to improve the reliability of its patches. He noted that there have been occasions in the past where Medical Network One has had to reinstall Microsoft patches that were initially faulty.
"They have been going in the right direction, but there's room for improvement," added Randy Bachman, information security principal at Lockheed Martin Information Technology in Newington, Va.
For instance, Bachman said, although Vista appears to be more secure than its predecessors and has integrated useful functions such as data encryption, Microsoft should also be working to add improved integrated spyware-detection and antivirus functions.
We are losing the security war'Security is getting worse,' says Counterpane CTO
Sumner Lemon Today’s Top Stories or Other Cybercrime/Hacking Stories
The Essential Communications Tools of Business Continuity
http://www.snpx.com/cgi-bin/news55.cgi?target=161804818?-1313
September 20, 2006 (IDG News Service) -- Companies are losing the battle to secure their IT systems from attacks by hackers and other threats, Bruce Schneier, the founder and chief technology officer of Counterpane Internet Security Inc., warned today.
"I don't think, on the whole, we are winning the security war; I think we are losing it," Schneier said in a speech webcast today at the Hack in the Box Security Conference (HITB) in Kuala Lumpur, Malaysia. As systems get more complex, they get less secure, he said. And as security technology improves, the complexity of modern IT systems increases even faster.
"The Internet is the most complex machine ever built," Schneier said. "This explains why security is getting worse."
In addition, the nature of the threat that companies face has changed in important ways. Where hacking was once considered an occupation for hobbyists, a growing number of hackers are now criminals with a profit motive. "The nature of the attacks are changing because the adversaries are changing," Schneier warned. "They have different motivations, different skill sets and different risk aversions."
Hobbyists now represent the minority of hackers, according to Schneier, which means hackers pose an even greater threat to companies. "The hobbyist is more interested in street cred; the criminal wants results," he said.
To turn the battle in its favor, the security industry must look beyond purely technical measures. "Look for the economic levers," he said. "If you get the economic levers right, the technology will work. If you get the economics wrong, the technology will never work."
Externalities, an economic term used to describe the effects of one person's actions on another, are central to building effective security, Schneier said. For example, U.S. banks do not spend heavily to defend against identity theft because they are not affected when such theft occurs. To the banks, this is an externality. However, when banks bear liability for a security breach, such as an unauthorized automated teller machine withdrawal, they make the investments necessary to prevent these incidents from taking place.
The same economic lessons can be applied to software vendors. To improve the security of software, Microsoft Corp. and others should be made liable for selling software that is not secure. "When you use buggy software and you lose data, that's your loss and not the software company's loss," Schneier said.
That needs to change. "The organization that has the capability to mitigate the risk needs to be responsible for the risk," he said
HITB runs through tomorrow
Good Morning! To answer your question, according to PR's and SEC filings from Exobox it should be no later than March-April 07.
I'm buying in dips and scooping up all I can....at these levels...
Have a Good One!
Eagle1,
Attack code targets new IE hole
Code that exploits a serious, yet-to-be-patched hole in Microsoft's Web browser has been posted on the Net.
By Joris Evers
Staff Writer, CNET News.com
Published: September 14, 2006, 5:10 PM PDT
TalkBack E-mail Print del.icio.us Digg this
Computer code that could be used to hijack Windows PCs via a yet-to-be-patched Internet Explorer flaw has been posted on the Net, experts have warned.
The code was published on public Web sites, where it is accessible to miscreants who might use it to craft attacks on vulnerable Windows computers. Microsoft is investigating the issue, the company representative said in a statement Thursday.
"Microsoft's initial investigation reveals that this exploit code could allow an attacker to execute memory corruption," the representative said. As a workaround to protect against potential attacks, Microsoft suggests Windows users disable ActiveX and active scripting controls.
The flaw is due to an error in an ActiveX control related to multimedia features and could be exploited by viewing a rigged Web page, Symantec said in an alert sent to users of its DeepSight security intelligence service Thursday. An attacker could commandeer a Windows PC or cause IE to crash, the security company said.
IE versions 5.01 and 6 on all current versions of Windows are affected, the French Security Incident Response Team, or FrSIRT, a security-monitoring company, said in an alert Wednesday. FrSIRT deems the issue "critical," its most serious rating. Microsoft noted that Windows 2003 running Enhanced Security Configuration is not affected.
In other news:
Vista's European battleground
Spending spree reshapes EMC
Women, careers and the game industry
News.com Extra: Double-layered disc contains all DVD formats
Video: 'The Simpsons' on your mobile phone?
Upon completion of its investigation, Microsoft may issue a patch for the flaw as part of its monthly release process, the company said. Microsoft is not aware of any attacks that attempt to exploit the new IE vulnerability at this time, it said.
The warning of the new flaw comes only days after Microsoft released its September patches. On Tuesday it released three updates, two for Windows and one for Office. The software maker also released a third version of an Internet Explorer fix after it botched the first two versions of the patch.
In recent months, word of new attacks has repeatedly followed shortly after "Patch Tuesday." Some experts believe the timing of the new attack is no coincidence, suggesting that attackers look to take advantage of a full month before Microsoft is scheduled to release its next bunch of fixes
http://news.com.com/Attack%2Bcode%2Btargets%2Bnew%2BIE%2Bhole/2100-1002_3-6115966.html?tag=cd.lede
HI Imgunnaretire! Hope K-9 had his earplugs in...lol
Go EXBX!
Eagle1,