Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
Malware in Text
A team of security researchers has engineered a way of hiding malware in sentences that read like English language spam. The research led by Dr. Josh Mason of Johns Hopkins University along with Dr. Sam Small of Johns Hopkins, Dr. Fabian Monrose of the University of North Carolina, and Greg MacManus of iSIGHT Partners outlined the threat in a paper English Shellcode (PDF) presented at the 2009 ACM Conference on Computer and Communications Security. According to the UK’s Computing, the paper shows hackers could evade anti-virus protection by hiding malicious code in sentences that read like English language spam
The article says that attackers could develop a tool that would be the next step in the hacking and virus arms race. Hackers could hide alphanumeric shellcode in valid files which would activate the malicious payload of a code-injection attack. This attack vector could give attackers control of system resources, applications, and data on a compromised computer.
The researchers report they can generate English shellcode in less than one hour on standard PC hardware. The text in bold is the instruction set and the plain text is skipped. “There is a major center of economic activity, such as Star Trek, including The Ed Sullivan Show. The former Soviet Union. International organization participation.”
The good news, Dr. Mason said that the widespread use of this attack vector is limited because the alphanumeric character set is much smaller than the set of characters available in Unicode and UTF-8 encodings. This means that the set of instructions available for composing alphanumeric shellcode is relatively small. “There was really not a lot to suggest it could be done because of the restricted instruction set,” said Dr. Mason. Long strings of mostly capital letters, for example, would be very suspicious.
Computing claims the work is a breakthrough. Current network security techniques work on the assumption that the code used in code-injection attacks, where it is delivered and run on victims’ computers, has a different structure to non-executable plain data, such as English prose. If an attacker challenge’s the assumption that executable code structure is different from non-executable data malware would be almost impossible to detect.
Dr. Nicolas T Courtois, an expert in security and cryptology at University College London, said malware deployed in this way would be “hard, if not impossible, to detect reliably.” The research is a proof of concept, but Dr. Mason doubts any hackers are using the technique to disguise their code. “I’d be astounded if anyone is using this method in the real world owing to the amount of engineering it took to pull off,” he said. “A lot of people didn’t think it could be done.”
Professor John Walker, managing director of forensics consultancy Secure-Bastion, argued the research highlights the flaws in the anti-virus community’s approach to security exploits. “There is no doubt in my mind that anti-virus software as we know it today has gone well past its sell-by date,” he said.
Related articles
- Malware Is a Disease; Let’s Treat It Like One (yro.slashdot.org)
rb-

If this technology gets out in the wild, most experts believe that the current signature-based anti-malware products will miss the attack and leave us all defenseless. Sounds like something the chip makers should be working on. Is this why Intel bought McAfee?
What do you think?
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Labor Day 2011
Labor Day in Detroit
Related articles
- Top 10 Labor Day Conspiracies (huffingtonpost.com)
- How America Spends Their Labor Day (businesspundit.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Mobile Patent Warfare
One of the hobbies i have taken up is patent troll watching. Thanks to Flowing Data for pointing out work by Mike Bostock which visualizes the data of who is suing who in the mobile patent warfare battles. To see a live version of this data network go to the bl.ocks.org website here.
The data on this chart indicates that Apple is at the heart of mobile patent warfare. Apple (AAPL) has been involved in 9 patent lawsuits. Other prodigious mobile patent litigators include Microsoft (MSFT) with 8 lawsuits, Kodak (KODK) with 7 suits, and newly created Google (GOOG)/Motorola union is involved in 5 mobile patent warfare skirmishes.
Related articles
- Google gets 18 key patents from $12.5 billion Motorola deal (slashgear.com)
- Patent Trolling: Kodak Next Up (EK, GOOG, MMI, AAPL, MSFT, RIMM, EMC) (247wallst.com)
- Google’s patent plot thickens with new Microsoft lawsuit against Motorola Mobility (venturebeat.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Verizon Upgrades Michigan Service to 4G – Almost

I was going to let this press release from Verizon Wireless slide without comment until I got to the end and then I had to jump right out of my Bach Seat and crank out this post. Verizon Wireless (VZ) told MiTechNews they are investing $850,000 in Michigan to upgrade 450 antennas on all of its cell sites between the Saginaw Bay north to the Mackinaw Bridge and east of Interstate 75 to Lake Huron. The company reports the new antenna equipment has resulted in incremental network coverage gains of up to one mile, improving overall reliability for customers.
The project will be complete when the company can swap equipment on one last tower in Roscommon where a nest of osprey chicks has called home since March.
“Our customers in eastern northern Michigan are able to use their devices in more places, especially in buildings,” explained David MacBeth, executive director–Network, Michigan/Indiana/Kentucky region, Verizon Wireless. “We’re constantly refining our network to ensure our customers have the best experience every time they pick up their wireless device.”
The company’s ongoing network investment in Michigan now totals more than $1.6 billion to increase the coverage and capacity of its network and to add new services.
rb-
Despite what Mr. MacBeth claims, I’ve heard about an organization that moved to VZW from another wireless provider and VZW could not provide the 4G or any G service in the building. When the customer pushed on VZW to provide any G or basic voice service in their building, the sales rep. came back and said, “we won’t help you because we spent all of our money.”
Apparently, that was the wrong answer, the organization reportedly moved 20 smartphones accounts from VZW back to the previous provider. But hey it is a good press release at least because VZW cares about baby birdies.
What do you think?
Related articles
- Verizon Wireless Expanding Its 4G LTE Market On Thursday, August 18th – Adding 15 More Cities To The Mix (androidpolice.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.


Facebook
