Thursday, December 17, 2009
Google Password Decryptor v1.0 Released
They have other great tools for recovering passwords too.
More Here...
Predator drones HACKED!
Check out the story here.
Tuesday, December 15, 2009
Facebook users unwittingly spread Koobface worm
More Here...
Tuesday, December 8, 2009
Hacking service steals Wi-Fi passwords in just 20 minutes
More Here....
Monday, December 7, 2009
Study: Facebook users willingly give out data
According to Sophos' Australian team, which conducted a study to see how likely Facebook users were to offer up personal information, 41 to 46 percent of the 100 people Sophos contacted "blindly accepted" friend requests from two fake Facebook users created by the security firm.
More Here....
Wednesday, December 2, 2009
Metasploit Gets New Vulnerabilty Scanning Features
More Here....
Tuesday, December 1, 2009
Northrop Grumman funds research group on Cybersecurity
Northrop Grumman will distribute "millions" of dollars over more than five years to Carnegie Mellon University in Pennsylvania, Purdue University in Indiana, and the Massachusetts Institute of Technology on projects to counter the most complex problems in cybersecurity, said Robert Brammer, chief technology officer of Northrop Grumman's information systems division.
More Here...
Clientless SSL VPNs expose corporate users to attack
More Here...
Monday, November 30, 2009
Mossad installs a trojan horse on a high ranking Syrian's laptop before bombing secret facility.
More Here...
Tuesday, November 24, 2009
Facebook worm spreads with a lurid lure
More here....
Monday, November 23, 2009
Choose a $%^&$#$*! Strong Password!
Based on what limited data is available, the vast majority of us choose very poor passwords. A MySpace phishing attack that netted some 34,000 actual user names and passwords, revealed that the No. 1 password was password1.
More Here...
New iPhone worm steals online banking codes, builds botnet
Computerworld - Hackers have borrowed a tactic from the world's first iPhone worm to build a botnet that steals data, including online banking credentials, from jailbroken Apple smartphones.
A new worm, dubbed "Duh" by U.K.-based security firm Sophos, is related to the "ikee" worm released earlier this month only in its approach, not in its code, said Chester Wisniewski, a senior security advisory with Sophos.
More here...
Microsoft confirms IE6, IE7 zero-day bug
Computerworld - Microsoft today confirmed that exploit code published last week can compromise PCs running older versions of Internet Explorer (IE), but said its security team has not yet seen any in-the-wild attacks.
The attack code, which was posted Friday to the Bugtraq security mailing list, affects both Internet Explorer 6 (IE6) and the newer IE7, Microsoft acknowledged. "Microsoft can confirm that the publicly available exploit code affects IE6 and IE7, not IE8," a company spokesman said in an e-mail reply to questions today.
IE6 and IE7 account for more than 41% of all browsers used worldwide, according to the most recent data from metrics firm Net Applications. IE8, meanwhile, has an 18.1% market share.
More Here...
Wednesday, November 18, 2009
Metasploit Framework 3.3 Released!
Metasploit runs on all modern operating systems, including Linux, Windows, Mac OS X, and most flavors of BSD. Metasploit has been used on a wide range of hardware platforms, from massive Unix mainframes to the Apple® iPhone™. Installers are available for the Windows and Linux platforms, bundling all dependencies into a single package for ease of installation. The latest version of the Metasploit Framework, as well as images, video demonstrations, documentation and installation instructions for many platforms, can be found online at http://www.metasploit.com/framework/."
More Here....
Anatomy of a Cyber-Espionage Attack
Reacting quickly, the analysts stanched the traffic flows but not before large amounts of corporate data had been stolen by unknown attackers.
Other large companies were also targeted during the same period. The attackers were able to process huge volumes of data, but they did so very selectively. They did not "take what they could get". They selected only specific files, a characteristic of highly professional attacks.
In addition, the attackers did not bother to view the files to verify their contents before "exfiltrating" them. This suggests that prior reconaissance missions had been conducted in which directory listings had been scrutinized beforehand and used to build a list of targets."
More Here....
Monday, November 16, 2009
Wireless Keylogger
"It cannot be detected by any kind of software!"
More Here...
Facebook's (In)security Tested Again
The breach was first reported by the blog Loose Wire.
Facebook, in a statement, was careful to assert the action taken by Control Your Info was not a hijacking of those Groups, because the Groups had no administrators to hijack.
According to Control Your Info, it simply found -- through a simple Google query -- which Facebook Groups had no administrator. It then logged into the Groups as their administrator."
Monday, November 2, 2009
Dutch Hacker Holds Jailbroken iPhones Hostage For €5 Ransom While Exposing Security Vulnerability
"Many of us have jailbroken our iPhones, but did everyone remember to change the default root password? Those guilty of that oversight are vulnerable to the simple intrusion method this guy used to hold iPhones hostage in the Netherlands.
Apparently all that it took to terrify many Dutch iPhone users was a "trivial" port scanning technique and "a modicum of networking know-how." After the hacker gained access to the jailbroken phones with unchanged root passwords and SSH enabled, he sent the pictured message which led to a demand for a €5 PayPal payment and words of caution"
More Here.....Workers Trade Password Security For Starbucks
"Internet security and infrastructure company VeriSign said that 85% of participants in a "lighthearted, unscientific" survey compromised their actual password, or revealed hints about their password, for a cup of coffee.
The National Security Agency may want to spend less on code-breaking technology and more on caffeine. Internet security and infrastructure company VeriSign Inc. Thursday said that 85% of survey participants compromised their actual password, or revealed hints about their password, for a cup of coffee.
Strictly speaking, the inducement was a $3 Starbucks gift card, enough to buy two cups of coffee or one latte."
Sunday, November 1, 2009
Facebook users hit by massive botnet attack - 'Bredolab' Trojan reaches at least 735,000 users
"A massive bot-based attack has been hitting Facebook users, with nearly three-quarters of a million users receiving fake password reset messages, according to security researchers.
The attack targets Facebook users with a spoofed message that claims recipients' Facebook passwords have been reset as a security measure. The messages, which come bearing subject lines such as 'Facebook Password Reset Confirmation', include a file attachment that supposedly contains the new password.
In fact, the attached .zip file includes a Trojan downloader, dubbed 'Bredlab' by some antivirus companies, 'Bredolab' by others. The downloader grabs a variety of malware from hacker servers, including fake security software, or 'scareware', and installs attack code and rogue antivirus applications on the compromised PCs."
More here.
Conficker worm has infected more than 7 million hosts.
"The Conficker worm has passed a dubious milestone. It has now infected more than 7 million computers, security experts estimate."
More Here.Lost Laptops: More Expensive than you Think
However, mobility has a downside: Lost or stolen laptops. The experience of losing a laptop can range from being a merely unpleasant inconvenience to precipitating a public relations disaster following the loss of intellectual property or customer data."
More Here.
Penetration Testing: Hacking for a Cause.
"Imagine you’re on your way to work. Your train is running late. While waiting on the platform, you whip out your smart phone to make a quick call to the office. Then, you pass some time by updating your Facebook status, logging on to your bank’s Web site to pay bills and checking the weather forecast for the weekend. You suddenly remember it’s your sister’s birthday tomorrow, so you go online to buy flowers to be delivered to her home. Just as you’re clicking “complete purchase,” you hear the rumbling of the train as it pulls into the station. And that’s all before your morning cup of joe.
Our world today is run by networks. We communicate with various technological devices, and these devices communicate with each other. As a result, unprecedented amounts of data — much of it sensitive — are floating about in a virtual world. Without appropriate gatekeepers, these networks could open up users to a world of trouble."