funsec mailing list archives
Re: Scam Uses Striptease To Break CAPTCHAs
From: "Paul Ferguson" <fergdawg () netzero net>
Date: Thu, 1 Nov 2007 22:19:41 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -- "Young, Keith" <Keith.Young () montgomerycountymd gov> wrote:
http://www.enterprise-security-today.com/story.xhtml?story_id=56423 <snip> Trend Micro researchers say the scam appears to be isolated for now to spammers trying to register bogus e-mail addresses and flood chat rooms with unwanted pitches. But they worry schemes to infiltrate financial institutions could soon appear. Spammers might be using the results to write a program to automatically bypass CAPTCHA systems. </snip> Fergie, any samples that you want to share? *smile*
If you're curious, they never actually get completely naked. ;-) - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFHKlD2q1pz9mNUZTMRAiMgAJ9gYh5CzL0nJ8DAync/BbbIogopuwCfaQvr OP58NSQz6doUhr1/UKVUw+0= =rccH -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- Scam Uses Striptease To Break CAPTCHAs Young, Keith (Nov 01)
- <Possible follow-ups>
- Re: Scam Uses Striptease To Break CAPTCHAs Paul Ferguson (Nov 01)