Browsing category

Data Security

Teen Hackers Who Doxed CIA Chief Are Targeting More Government Officials

A cybersecurity expert once told me something I’ll never forget: “don’t underestimate what bored teenagers can do.” A group teenagers that call themselves “Crackas With Attitude” reminded me of those words when they were able to hack into the personal AOL email account of CIA Director John Brennan. The teenagers, who described themselves as “stoners,” […]

Russian Banks Under Attack from Tinba Banking Botnet

Customers of Russia’s biggest banks are under attack.Dell SecureWorks has detected an ongoing campaign that is targeting users of several Russian banks and payment service providers. The cyber-criminals behind this affair are believed to be operating a large botnet that spreads the Tinba 2.0 banking trojan and aggregates financial information from its victims. Tinba is […]

Stuxnet-style code signing of malware becomes darknet cottage industry

Even reports of crims offering signing-as-a-service. Underground cybercrooks are selling digital certificates that allow code signing of malicious instructions, creating a lucrative and expanding cottage industry in the process, according to new research from threat intelligence firm InfoArmor. In one case, a hacker tricked a legitimate certificate authority into issuing digital certificates for malware before […]

Return of the EXIF PHP Joomla Backdoor

Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it also presents an opportunity to identify interesting threats that aren’t new but may be reoccuring. Such as today’s post, in which we explore a case we shared close to two years ago where […]

Security Researcher Creates Tool to Extract Passwords from KeePass Databases

Denis Andzakovic, a security researcher for Security Assessment, has created a tool that can fool the KeePass password manager into exporting its internal passwords database as a CSV file, showing user account credentials in cleartext. The tool, which he ironically named KeeFarce, is available on GitHub, and despite its powerful attributes, it only works if […]

Android Malware Disguises itself as MS Word Doc, Spies on Your Phone

Researchers have discovered an Android malware disguising itself as a Microsoft word document which triggers a malicious code once opened. This Android malware was found when a user installed an app from third-party app developers. Once the app was installed, a Microsoft word like icon appeared on the home screen and before even the user could think […]

Snapchat to save, modify and republish your private photos

Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting company’s new terms and conditions. Snapchat is one of the most popular chatting and picture sharing apps and according to company’s statistics over the last year 700 million messages were sent through the […]

Leaving Laptops in Hotel Rooms: A Bad Idea

A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two if you spend a lot of time in one location overseas and don’t / can’t switch SIMs in your main one. They probably have a fair bit of info on them, especially if […]

Vodafone Hacked, Customers’ Personal Data, Banking Information Stolen

In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details. According to the Mobile Phone provider firm, hackers gained access to 1,827 accounts and managed to steal confidential details about its customers such as name, date of birth, mobile number, bank sort codes […]

Home Network Analysis: DVRs and my Network Interact

My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the addition of a TV DVR system to my home network. In this post, I’m going to go into some details about what I found on the network for the pure pleasure of it […]

European Parliament offers support to Edward Snowden

The European Parliament has voted in favour of a resolution that calls on all EU member states to “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties”. Mr. Snowden, who was described by the parliament as an “international human rights defender”, described the announcement as […]

Report: CryptoWall Creators Earned $325 Million in Bitcoin Ransoms

A cyber-security industry group has published new research on the CryptoWall ransomware campaign, finding that the attacks have generated more than $300m in ransom income and stem from a single source or entity. The report was published earlier this week by the Cyber Threat Alliance, founded by Intel Security, Symantec, Palo Alto Networks and Fortinet. Major […]

Google merging Chrome OS and Android? Not so fast

The two platforms drive different devices. But would combining them really be a bad thing? On Thursday, the The Wall Street Journal published a report claiming that Google is in the process of merging its two operating systems: Chrome OS and Android. GOOGLE MERGING CHROME OS AND ANDROID? NOT SO FAST According to the Journal’s […]

Tor launches anti-censorship Messenger service

A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to chat over the Tor (The Onion Router) network in a way which hides the location of participants. It means that the contents of messages will only be visible to the participants. The service […]

IETF recognizes .onion as special-use domain name

Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and important landmark in the movement to build privacy into the structure of the Internet,” Jacob Appelbaum, a security researcher and developer, privacy expert and a core member of the Tor Project, said in […]

Google HTTP Search, yes, it is still possible

  Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a mandatory feature for logged in Google users, and after a while for all users on the main Google Search website. Workarounds to use HTTP instead of HTTPS on Google Search existed ever since […]