Browsing category

Data Security

Security firm sued for filing “woefully inadequate” forensics report

Hacked casino operator alleges breach continued while Trustwave was investigating. A Las Vegas-based casino operator has sued security firm Trustwave for conducting an allegedly “woefully inadequate” forensics investigation that missed key details of a network breach and allowed credit card thieves to maintain their foothold during the course of the two-and-a-half-month investigation. In a legal […]

Suspected MegalodonHTTP DDoS botnet author arrested

Security firm Damballa says that when computer crime cops in Norway arrested five men last month in a joint operation with Europol, one of them was the creator of the MegalodonHTTP botnet used to launch distributed denial-of-service (DDoS) attacks against websites. At the time of the arrest by Norway’s Kripos national criminal investigation service, little […]

The Silk Road’s Dark-Web Dream Is Dead

NOT SO LONG ago, the Silk Road was not only a bustling black market for drugs but a living representation of every cryptoanarchist’s dream: a trusted trading ground on the Internet where neither the government’s laws nor the Drug War they’ve spawned could reach. Today, that illicit narco-utopia is long gone, its once-secret server in […]

STEAL YOUR WI-FI KEY FROM YOUR DOORBELL? IOT WTF!

The Ring is a Wi-Fi doorbell that connects to your home Wi-Fi. It’s a really cool device that allows you to answer callers from your mobile phone, even when you’re not home. It’s one of the few IoT devices we’ve looked at that we might even use ourselves. It acts as a CCTV camera, automatically […]

Black Hat SEO Campaign Leverages SQL Injections to Boost Search Rankings

A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flaws to deface websites with hidden content, specifically aimed at improving his website’s SEO ranking. The campaign has targeted around 3,800 different websites, hosted on 348 […]

SSH Backdoor Identified in Fortinet Firewalls

Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series up to and including 4.3.16, and the 5.x series up to and including version 5.0.7. This vulnerability is not a deja vu of the Juniper incident and seems to be a completely different […]

New Anonymous Communication Network PrivaTegrity Launched

PrivaTegrity communication network provides secure communication platform and Anonymity — Maybe better than Tor. A new anonymous communication network by the name of PrivaTegrity has been launched by renowned encryption specialist David Chaum. The network achieves same connection speed as Tor but provides better protection against cryptanalysis techniques. According to the encryption specialist, PrivaTegrity addresses as […]

Experts warn Neutrino and RIG exploit kit activity spike

Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals always exploit new opportunities and users’ bad habits, now crooks behind the recent campaigns relying on Neutrino and RIG exploit kits are ramping up attacks against users that haven’s patched their Adobe Flash software. “It […]

Say “Cyber” again—Ars cringes through CSI: Cyber

CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the words “hacking” and “cyber” are introduced into the plot. But of all the broadcast and cable networks, CBS is the biggest purveyor of techno-idiocy, proving again and again that none of the producers […]

Smartwatches Can Be Used to Spy on Your Card’s PIN Code

Wearable devices can be used as motion-based keyloggers. French student and software engineer, Tony Beltramelli, has published his master thesis called Deep-Spying: Spying using Smartwatch and Deep Learning, in which he presents a new attack method that allows attackers to extract sensitive information like credit card or phone access PIN codes from motion sensors in wearable […]

Juniper drops NSA-developed code following new backdoor revelations

Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line of firewalls contained unauthorized code that can surreptitiously decrypt traffic sent through virtual private networks, said it will remove a National Security Agency-developed function widely suspected of also containing a backdoor for eavesdropping. […]

Apple, Google, Microsoft attack government hacking plans

Tech industry hits back at plans to create legal framework for hacking by spies, military and police. Tech companies including Apple, Microsoft, Google and Facebook have criticized plans by the UK government for a new law that would allow law enforcement to hack computer systems to access data. The equipment interference provisions in the draft […]

ProPublica Launches the Dark Web’s First Major News Site

THE SO-CALLED DARK web, for all its notoriety as a haven for criminals and drug dealers, is slowly starting to look more and more like a more privacy-preserving mirror of the web as a whole. Now it’s gained one more upstanding member: the non-profit news organization ProPublica. On Wednesday, ProPublica became the first known major […]

Authors digitally signed Spymel Trojan to evade detection

Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. In late December, security experts at Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. “ThreatLabZ came across yet another malware family where the authors are using compromised digital certificates to evade detection. The malware family in […]

Anti-NSA Blackphone Not So Secure After all

A security flaw in Blackphone 1 smartphone allowed anyone to take control of the device Blackphone 1 smartphones, one of many privacy-focused phones in the market was found to have a critical vulnerability which allowed attackers to hijack the phone until a recent fix from the manufacturer. The flaw was discovered by a team of […]

Remote Exploitation of Microsoft Office DLL Hijacking (MS15-132) via Browsers

A number of weeks back, security researcher Parvez Anwar posted a number of DLL hijacking vulnerabilities within Microsoft Office on Twitter [1]. The following week, Microsoft released MS15-132, which addressed some of these vulnerabilities, along with a large number of very similar bugs reported by others in various guises. [2] [3]. The vulnerabilities that were […]

Windows and Linux Malware Linked to Chinese DDoS Tool

Malware was infecting machines, adding them to its botnet.Similar-looking malware targeting both Linux and Windows computers has been linked to a DDoSing toolkit sold by Chinese hackers via the ddos[.]tf service, Malware Must Die! reports. The malware, codenamed Linux/DDOSTF (or Linux/MrBlack) targets mainly Linux machines running Elasticsearch servers, but also attacks and infects Windows systems, […]

TOR Anonymity: Things Not To Do While Using TOR

Short Bytes: Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But there are some things that you need to keep in mind so that you don’t blow your anonymity cover while using the TOR network.  The internet is awe-inspiring, but it has its nightmares for […]