The Blog
HOME
Thursday, February 28, 2013
How much does it cost to buy 10,000 U.S.-based malware-infected hosts?
http://blog.webroot.com/2013/02/28/how-much-does-it-cost-to-buy-10000-u-s-based-malware-infected-hosts/
Revealed: Stuxnet “beta’s” devious alternate attack on Iran nuke program
http://arstechnica.com/security/2013/02/new-version-of-stuxnet-sheds-light-on-iran-targeting-cyberweapon/
ABC hacked after anti-Islam politician Interview
http://thehackernews.com/2013/02/abc-hacked-after-anti-islam-politician.html
Stuxnet 0.5 : Symantec study reveals Stuxnet was dated 2005
http://thehackernews.com/2013/02/stuxnet-05-symantec-study-reveals_27.html
Bypassing Google Two Factor Authentication
http://thehackernews.com/2013/02/bypassing-google-two-factor.html
How to bypass iOS 6.1.2 Screen Lock, another Exploit Exposed
http://thehackernews.com/2013/02/how-to-bypass-ios-612-screen-lock.html
Two new Java zero-day vulnerabilities reported to Oracle
http://thehackernews.com/2013/02/two-new-java-zero-day-vulnerabilities.html
The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor
http://www.securelist.com/en/blog/208194129/The_MiniDuke_Mystery_PDF_0_day_Government_Spy_Assembler_0x29A_Micro_Backdoor
http://www.securelist.com/en/downloads/vlpdfs/themysteryofthepdf0-dayassemblermicrobackdoor.pdf
Monday, February 18, 2013
Reveton: Winter Collection II - Design refresh, ICE and EC3 logo
http://malware.dontneedcoffee.com/2013/02/revetoncollectionwinterII.html
Friday, February 15, 2013
Cyber Attacks Against Uyghur Mac OS X Users Intensify
http://www.securelist.com/en/blog/208194116/Cyber_Attacks_Against_Uyghur_Mac_OS_X_Users_Intensify
Malawi Google ,MSN, Yahoo domains defaced by TiGER-M@TE
http://thehackernews.com/2013/02/malawi-google-msn-yahoo-domains-defaced.html
Zeus banking Trojan targeting five major banks in Japan
http://thehackernews.com/2013/02/zeus-banking-trojan-targeting-five.html
iOS 6.1 Hack allows iPhone lock screen bypass
http://thehackernews.com/2013/02/ios-61-hack-allows-iphone-lock-screen.html
Cross Platform Trojan builder distributed on underground forums
http://thehackernews.com/2013/02/cross-platform-trojan-builder.html
Wednesday, February 13, 2013
What Do Infosec Professionals Know About APTs?
http://blog.trendmicro.com/trendlabs-security-intelligence/what-do-infosec-professionals-really-know-about-apts/
OUYA is coming, but is it safe?
http://blogs.avg.com/student/ouya-coming-sink-swim/
Distributed Red Team Operations with Cobalt Strike
http://thehackernews.com/2013/02/distributed-red-team-operations-with.html
The Top Six Ways You Will Benefit From Event Log Monitoring
http://thehackernews.com/2013/02/the-top-six-ways-you-will-benefit-from.html
Microsoft Surface Pro Teardown
http://www.ifixit.com/Teardown/Microsoft+Surface+Pro+Teardown/12842/1
Malware injected into legitimate JavaScript code on legitimate websites
http://nakedsecurity.sophos.com/2013/02/13/malware-javascript/
Monster super-critical Patch Tuesday for February 2013
http://nakedsecurity.sophos.com/2013/02/12/monster-super-critical-patch-tuesday-for-february-2013/
Bizarre Google search bug benefits porn websites
http://nakedsecurity.sophos.com/2013/02/12/google-search-bug/
Building Nginx From Source On Debian Squeeze
http://www.howtoforge.com/building-nginx-from-source-on-debian-squeeze
Monday, February 11, 2013
Yahoo! Pushing Java Version Released in 2008
http://krebsonsecurity.com/2013/02/yahoo-pushing-java-version-released-in-2008/
Security Firm Bit9 Hacked, Used to Spread Malware
http://krebsonsecurity.com/2013/02/security-firm-bit9-hacked-used-to-spread-malware/
Urausy: Colorfull design refresh (+HR) & EC3 Logo
http://malware.dontneedcoffee.com/2013/02/urausy-colorfull-designrefresh.html
How To Integrate ClamAV Into PureFTPd For Virus Scanning On Fedora 18
http://www.howtoforge.com/how-to-integrate-clamav-into-pureftpd-for-virus-scanning-on-fedora-18
VMWare security hole - it sounds like you need the patch, even if it's not clear why
http://nakedsecurity.sophos.com/2013/02/11/vmware-security-hole-its-sounds-like-you-need-the-patch/
http://www.vmware.com/security/advisories/VMSA-2013-0002.html
"Intel Packet of Death" not Intel's problem
http://www.h-online.com/security/news/item/Intel-Packet-of-Death-not-Intel-s-problem-1801537.html
Lots of router vulnerabilities, not many patches
http://www.h-online.com/security/news/item/Lots-of-router-vulnerabilities-not-many-patches-1800471.html
At Facebook, zero-day exploits, backdoor code bring war games drill to life
http://arstechnica.com/security/2013/02/at-facebook-zero-day-exploits-backdoor-code-bring-war-games-drill-to-life/
Seven vulnerabilities found through Mega’s security bounty program
http://arstechnica.com/security/2013/02/seven-vulnerabilities-found-through-megas-security-bounty-program/
Monday, February 4, 2013
Viruses, Trojans, and worms, oh my: The basics on malware
http://arstechnica.com/security/2013/02/viruses-trojans-and-worms-oh-my-the-basics-on-malware/
Oracle releases emergency patches for Java
http://www.h-online.com/security/news/item/Oracle-releases-emergency-patches-for-Java-1796543.html
Mobile attacks!
http://www.securelist.com/en/blog/805/Mobile_attacks
PiceBOT Crimeware Kit targeting Latin America Banks
http://thehackernews.com/2013/02/picebot-crimeware-kit-targeting-latin.html
DNS Changer malware mastermind pleaded guilty
http://thehackernews.com/2013/02/dns-changer-malware-mastermind-pleaded.html
Remote Root access vulnerability in Routers with Broadcom chipsets
http://thehackernews.com/2013/02/remote-root-access-vulnerability-in.html
Hacker discloses vulnerabilities in dozens of Military and Pentagon websites
http://thehackernews.com/2013/02/hacker-discloses-vulnerabilities-in.html
http://pastebin.com/Cpgp9jHE
https://pastee.org/s9232
Hackers breach Twitter and 250,000 accounts compromised
http://thehackernews.com/2013/02/hackers-breach-twitter-and-250000.html
A US$49 personal autonomous micro UAV?
http://www.gizmag.com/mecam-tiny-autonomous-uav/26007/
Friday, February 1, 2013
Attention! All data on your hardrive is encrypted
http://blogs.avg.com/news-threats/attention-data-hardrive-encrypted/
50,000 Accounts leaked from Pympy.com
http://www.cyberwarnews.info/2013/02/01/50000-accounts-leaked-from-pympy-com/
http://www.jurispericia.com/404.html
Fake Booking.com ‘Credit Card was not Accepted’ themed emails lead to malware
http://blog.webroot.com/2013/02/01/fake-booking-com-credit-card-was-not-accepted-themed-emails-lead-to-malware/
Newer Posts
Older Posts
Home
Subscribe to:
Posts (Atom)