Operating System Vulnerabilities, Exploits and Insecurity
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.
According to the UK authorities, 56 hackers have been arrested across England, Wales and Scotland with accusations of carrying out anti-cybercrime operations. UK’s National Crime Agency arrested these 56 hackers as a part of their “strike week” to curb the cyber crime menace. These arrests were made as a result of 25 operations and the […]
Unknown hackers have hacked the computer systems of South Korea’s nuclear plant operator and leaked noncritical data claim the officials. The targeted institution was Korea Hydro and Nuclear Power (KHNP), where latest designs and manuals of two reactors, personal details of over 10,000 workers, flow charts and estimates of radiation exposure among local residents were leaked. At the moment […]
Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”
Kaspersky Lab, the Moscow-based computer security software firm, has unearthed a cyber-spying campaign apparently started by a Spanish-speaking country. The campaign targeted government agencies, energy companies and activists in 31 countries. Image by Kaspersky Labs The campaign, dubbed as “The Mask” (translation for the Spanish word Careto), was stopped last week, but has been operational […]
It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can see from several tech giants and business institutions who cooperated with the American National Security Agency (NSA) for its spying and surveillance project PRISM. These companies are now loosing billions of dollars and most […]
Edward Snowden who is the whistleblower for NSA has once again revealed that NSA has hacked operators of China Mobile and has stolen text messages in millions. Every now and then, Washington shouts out that their systems are being hacked and normally accuse China of such activities but the fact is that they are themselves […]
In our previous post on Operation Hangover, we revealed the existence of an attack group, apparently operating from within India, who were mainly targeting systems in Pakistan. In this post, we will analyze the Mac OS X samples that have been linked to this group and will provide new evidence that the Mac and Windows spywares are related.
Online hackavists from Turkish Ajan hacking group have hacked and defaced the official website of Akron Canton Airport (http://www.akroncantonairport.com), as a result information of over 15,000 people along with airport’s tenders and other financial details have been leaked online for #usaOPERATION1. The group left their deface page along with a message on the hacked website against USA and […]
The Financial Times reported that the UK and India will improve co-operation in a bid to combat the growing threat from international cyber crime and cyber warfare in a new agreement between the two countries. The announcement was made during British Premier David Cameron’s trade trip to the emerging economic power.
Earlier I updated you regarding a successful hacking attack on Indonesian Presidential website by Jember Hacker Team. Today the Indonesian police has arrested an Internet cafe operator from the East Java district of Jember for allegedly hacking the presidential website. The 22 years old, Wildan Yani Ashari is an Indonesian citizen who works at an Internet cafe as an operator. The cafe is […]
The hackers from The Bad Piggies Team have hacked and defaced the official website of Thailand’s Culture Ministry (m-culture.go.th)early morning. The hackers left their deface page and a message on the hacker ministry website; displaying message in Thai language, demanding to bring back the banned political soap opera “Nua Mek 2” to the public, “Return Nua Mek 2 […]
The hackers from famous Bangladesh Black Hat Hackers (BBHH), today have hacked and defaced the official website of government of Andhra Pradesh road Transport Cooperation (apsrtc.gov.in). The hackers who are known for their high profile attacks against the government of India left their deface page and a message on the hacked website. The message explain the reason […]
The online hackavist group Anonymous has launched its new operation and named it #Operation Unite against the President Obama’s signing over/passing a bill during Christmas that according to Anonymous has put American freedom in jeopardy. In the new video uploaded by @Crypt0nymous, Anonymous has urged the American citizens to stand against the bill signed by President Obama and […]
Disasters, new hardware, new software: to the phish scammer, it’s all potential bait for reeling in victims.
CeCOS, to be held in Prague between 25-27 April,will again look at operational issues and the development of communal resources for first responders and forensic professionals.
Anonymous hackers have unconfined their OS with the name “Anonymous- Operating System Anonymous-OS 0.1”. It is an ubuntu-based distribution and created under Ubuntu 11.10 and uses mac desktops. Live USB can be created with Unetbootin. Some of the programs already installed on this Anonymous Operating System are: Find Host IP ParolaPass Password Generator Slowloris Pyloris […]
While serving in the Marine Corps, one activity that I felt was effective in preparing both myself and my unit to be able to handle real-world scenarios, was getting as much experience as possible from military training exercises. In most cases multiple branches worked together or, as in the case with NATO exercises, multiple countries