Blog Posts Tagged with "Attacks"

7ddc1f3000a13e4dfec28074e9e7b658

Pro-Syrian Hackers Target Activists with Fake Anti-Hacking Tool

August 16, 2012 Added by:Electronic Frontier Foundation

The latest malware campaign plays into users' concerns about protecting their security by offering a fake security tool called AntiHacker, which promises to provide "Auto-Protect & Auto-Detect & Security & Quick scan and analyzing." AntiHacker instead installs a remote access tool called DarkComet RAT...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cyber Arms Deals and Latin America in the Post-Stuxnet World

August 15, 2012 Added by:Richard Stiennon

The trade of conventional weapons is a multi-billion dollar industry. But when it comes to cyber weapons, developed nations have yet to place limits on what kind of offensive software can be sold. It becomes a necessity to begin some kind of international regulatory system for cyber weapons and the prerequisite expertise...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Weakest Link in the Security Chain: Is it in Your Controls?

August 11, 2012 Added by:Tripwire Inc

Rather than brute-forcing the account, the hackers gained access by doing some creative social engineering by contacting Apple customer support. The problem is that we often turn over our data to 3rd-party providers without understanding what protocols they have in place to keep our data safe...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Network Security: Presence, Persistence, and Pivoting

August 08, 2012 Added by:Rob Fuller

Explaining what goes through an attackers head when they get a shell is virtually impossible, even more so to generalize into a methodology, but I’ve tried to do that with the "Three P’s of Post Exploitation” - they are in a certain order for a reason, but certainly up to circumstance to what order is best...

Comments  (0)

F63d0b2876c57f0bb53f053dd6b7b747

Employee Fired for Spying on Management with RAT

August 08, 2012 Added by:Jeremy Sobeck

An executive discovered that an unauthorized remote access tool (RAT) on his computer. This type of attack requires very little sophistication. The company assumed the worst: confidential files had been stolen, malware had been installed, and the fired employee still had remote access to their systems...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Yourikan Claims Ninety-One Iranian Websites Hacked

August 07, 2012 Added by:Headlines

Pro-Israeli hacker Yourikan (you-r!-k@n) is claiming to have hacked and defaced as many as ninety-one Iranian websites including government, education and business targets in protest of Iran's continued pursuit of nuclear weapons and support for terrorist activities targeting Israel...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Wireless Network Security: A Beginner's Guide

August 02, 2012 Added by:Ben Rothke

The T.J. Maxx data breach was due to insecure wireless connectivity. Estimates of the costs for this security fiasco are a staggering $4.5 billion. Had the staff at T.J. Maxx had this book at hand and used it, they may have been able to save themselves a significant amount of money...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Rakshasa: Is it Possible to Design the Perfect Hardware Backdoor?

August 01, 2012 Added by:Pierluigi Paganini

Rakshasa malware infects the host’s BIOS and takes advantage of a vulnerable aspect of traditional architecture, as peripherals like network cards or sound cards can write to the computer’s RAM or to portions of the memory allocated to any of the other peripherals. It is hard to detect, and quite impossible to remove...

Comments  (5)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber: Boundless Nonsense

July 31, 2012 Added by:Don Eijndhoven

What is neutral behavior in the context of cyber warfare? Are you, as a neutral country obliged to drop all traffic between these two waring nations that crosses your networks? And if you’re not, are you obliged to make sure none of the cyber attacks are originating from compromised systems within your borders?

Comments  (8)

03b2ceb73723f8b53cd533e4fba898ee

Mahdi and AC/DC: The Middle East as a Shooting Range

July 30, 2012 Added by:Pierluigi Paganini

In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...

Comments  (2)

4777ea0d573c51027a097399006f228a

An Urgent Message to My Supporters

July 27, 2012 Added by:ʞɔopuooq ʇuıɐs

On this first day of Defcon, it appears my @th3j35t3r twitter account has been suspended. Coincidence? Probably not. We all know I have some pretty desperate enemies who will stop at nothing to see me inconvenienced, discredited or otherwise annoyed. So here’s the upshot...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Mahdi Campaign and Cyber Espionage in the Middle East

July 19, 2012 Added by:Pierluigi Paganini

The Mahdi attack is based on two well known techniques used to deliver malicious payloads, and the huge quantity of data collected reveals the real targets of the operation are government agencies, critical infrastructure engineering firms and financial houses...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DHS: Cybersecurity Awareness and the Summer Olympics

July 19, 2012 Added by:Infosec Island Admin

Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Morphing Network Assets to Restrict Adversarial Reconnaissance

July 18, 2012 Added by:Headlines

"The intent of cyber maneuver is to place computer network defense technology into a proactive state, thereby shifting the advantage away from the attacker. By constantly changing the characteristics of the networks it resides on, MOPRHINATOR provides a more robust and trusted networking solution..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Application Layer DDoS Attacks Decline in Q2 2012

July 18, 2012 Added by:Headlines

“Q2 data showed a return to traditional infrastructure attacks and is likely a reflection of changing tools for launching DDoS attacks. With Layer 7 attacks, the risk of detection and eventual take down by law enforcement increases because these attacks disclose the IP address of the attacking botnet..."

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »