InfoSec News

Criminals who use the Zeus banking crimeware may be working on an new angle: corporate espionage.
North Korea appears to have made its first full connection to the Internet. The connection, planning for which has been going on for at least nine months, came as the reclusive country prepares to mark the 65th anniversary of the founding of the ruling Workers' Party of Korea with a massive celebration and military parade.
Columnist Mike Elgan has 10 things that he doesn't get about consumer technology. Check out his list. Do you have other peeves?
Banking giant Credit Suisse has sated its power consumption hunger through the use of virtualization
We have all needed to dispose of unused computers at home and the office. I would like to encourage each of you to consider a responsible choice that helps the environment while at the same time safeguarding yourself, your company and your data.
Before disposing of any computer please consider the following as they may be helpful:

Save all important documents off onto a secure removable storage device, preferably encrypted media.
Wherever possible, extract any software license keys for reusable software.
Wipe your hard disk with Kill Disk, Boot and Nuke or like software. I typically keep/destroy my drives, but before I do I will wipe them by attaching them to another computer with my handy hard drive adapter kit. The adapter kit allows me to attach SATA/IDE drives to any computer through the USB port. (It's handy...and has bailed me out many times.)
Remove any reusable cables or parts such as a network card. (A backup NIC is always handy...)
Remove any batteries and recycle them properly.

Here is a list of URL's of the recycling programs from some of the well known players in the computing industry. Mileage will vary based on your needs. I have used Best Buy's program for no other reason than its convenience and accessibility. Many other's have different things to offer. Review them all and see which suits you.






Lenovo (IBM)


Best Buy

Donating your computer is always a good choice as well. However, remember if you choose to donate any computer there are things that should be done to prevent harm to you or your company and exposing sensitive data. You will read more on Securing a Donated Computer another day. That is the topic for Day 16, stay tuned...
Please comment below if you know any additional steps or resources out there to assist in computer disposal and as always contact us via our contact form. Any sites that help out for countries other than the US would be great to share.

Kevin Shortt

ISC Handler on Duty

(c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.

Internet Storm Center Infocon Status