Browsing category

Data Security

FinFisher Spyware Becomes More Popular Among Government Agencies

The number of countries deploying it grows to 32.FinFisher, a piece of spyware sold to governments by a German security vendor, has been linked by recent research to at least 32 governments around the world, more than ever before. Citizen Lab, a research department at the University of Toronto, has been studying the usage of […]

Yahoo only the latest at “kill the password” altar

Industry looking to improve access controls and authentication, but decisions still governed by security requirements, use cases, hacker disruption. Yahoo this week became the latest to pass out the torches and pitchforks on the march to kill the password as a way to repair authentication for consumers and enterprises. The ongoing deathwatch is a popular […]

Russian Hackers of Dow Jones Said to Have Sought Trading Tips

A group of Russian hackers infiltrated the servers of Dow Jones & Co., owner of the Wall Street Journal and several other news publications, and stole information to trade on before it became public, according to four people familiar with the matter. The Federal Bureau of Investigation, Secret Service and the Securities and Exchange Commission […]

How to prevent HSTS tracking in Firefox

HTTP Strict Transport Security (HSTS) was designed to help secure websites (those using HTTPS) by declaring to web browsers that they should communicate only via HTTPS with the server to protect connections against downgrade attacks and cookie hijacking. Mozilla implemented support for HTST in its current form in Firefox in 2014 and it has been […]

Brolux trojan targeting Japanese online bankers

A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer discovered in late 2014. Both exploits are (still) distributed through an adult website and try […]

How the NSA can break trillions of encrypted Web and VPN connections

Researchers show how mass decryption is well within the NSA’s $11 billion budget. For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from the US National Security Agency and other state-sponsored spies. Now, researchers are […]

Prices of stolen data on the Dark Web

Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online platforms, communities, and marketplaces where stolen data is bought and sold. Drawing on this experience, its researchers can now provide an overall assessment of the “state of […]

How to scan whole Internet 3.7 billion IP addresses in few minutes?

Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you don’t have the resources of a botnet, a single scan can take months. If you want to take snapshots of the internet it will be very […]

Researcher messes up Wi-Fi with an rPi and bargain buy radio stick

Putrid Piper picked apart a packet for just $15. KU Leuven Phd student Mathy Vanhoef has smashed conventional wireless security thought by creating continual, targeted and virtually indefensible stealth jamming of WiFi, Bluetooth, and Zigbee networks, and tampering with encrypted traffic, with little more than a $15 dongle. The wireless security boffin presented his work […]

Watch Out – This Killer USB Drive Will Fry Your Laptop

Do you know the USB devices we carry each day can be converted into a bomb? You must be thinking like “yeah whatever.” No, it’s true, a researcher just showed how a USB can be converted into a killer USB that can kill your whole PC within seconds. Though, this is not the first time such […]

USB Killer Version 2.0 is Here to Burn and Destroy Your Computer

The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the computer frying USB drive. The Killer USB v2.0 is more refined as it now dumps the -220V directly onto the USB signal wires. Earlier this year, I told you about the a proof-of-concept computer-burning USB Killer drive, […]

Hackers can steal your BRAIN WAVES

Depressingly familiar and stupid mistakes in EEG kit, health org’s storage of recorded brains. BruCon: Behold the future: attackers can already get between brain-waves and hospital kit, and it’s just going to get worse according to IOActive senior consultant Alejandro Hernández. Hernández says the ability to steal, manipulate, and replay brain waves used in electroencephalography […]

Cops Don’t Need a Crypto Backdoor to Get Into Your iPhone

The privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly overruled law enforcement and intelligence officials, deciding that it won’t pursue a policy of pushing tech companies to put “backdoors” in their encryption that would allow government agencies to access decrypted private data. […]

Hackers Can Steal Corporate Passwords Through Cisco’s WebVPN Service Backdoor

Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness allows hackers to steal corporate account passwords when employees logged into their accounts. Hackers managed to load backdoors via different JavaScript snippets which were then loaded on Cisco’s ASA WebVPN service. The procedure […]

US Ports – Cyber attacks can cause the release of dangerous chemicals

US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable to cyber attacks, this is not novelty, but it is interesting to explore how many infrastructure is open to hacking assaults. US ports are also vulnerable to cyber […]

Variants now spawning off new Android SMS malware

AndroidOS.SmsThief does what it says on the tin – acts as a thief through SMS, on Android. Mobile network security and threat detection company AdaptiveMobile says it has been tracking the emergence of a new strain of Android malware. The appropriately named AndroidOS.SmsThief targets SMS message users on Android and has been evolving and developing […]

Matthew Keys’ Hacking Conviction May Not Survive an Appeal

HE CONVICTION OF former Reuters employee Matthew Keys on hacking charges this week has renewed focus on a controversial federal law that many say prosecutors are using incorrectly and too broadly to inflate cases and trump up charges. The Computer Fraud and Abuse Act, or CFAA, is a federal law that was designed to target […]