Hacking Governments With Hijacked Sites

Monday, 23 April 2012 18:02 Written by
Hacking Governments With Hijacked Sites

Malicious code planted within compromised Wed pages has become the latest method for attackers targeting government organizations, according to research from security firm Zscaler, V3.co.uk reported April 21. The firm discovered many government-affiliated Web sites with code that directs users to attack servers.

The most recent site to become infected was that of the French budget minister. It was found to contain obfuscated Javascript code that sends the user to a third party site and then attempts to exploit vulnerabilities and install malware on the targeted system. The attack is the latest in what Zscaler sees as a string of site hijackings aimed at government-controlled domains.

Social Engineers Target Utilities

Saturday, 21 April 2012 12:48 Written by
Social Engineers Target Utilities

The U.S. Cyber Emergency Response Team (US-CERT) recently warned that cyber criminals are attempting highly targeted social engineering attacks on operators of Industrial Control Systems (ICS).  ICS are very present in Utility firms. The attacks are in the form of phishing phone calls allegedly coming from "Microsoft Server Department" and warning of infected PCs. The attacker attempts to have the utilities turn on services which would allow unauthorized remote access

HINT: Microsoft is not going to call you unless you specifically requested to be called. (see also US Utilities Under Daily Cyber-attack)

‘Steam Cracker’ Steals User Credentials

Saturday, 21 April 2012 11:44 Written by
‘Steam Cracker’ Steals User Credentials

Users of Valve’s Steam game sales and distribution platform are being targeted by malware peddlers; the lure is a "Steam Cracker." It is being offered on YouTube and on many gamer forums, and it supposedly gives the users access to all games for free.

The scammers offer simple instructions for installing the software: disable antivirus software and firewall, then replace the original steam.exe file with the downloaded, cracked one. "The file in question is a fake Steam client, which uses aspects of the real thing but just falls short of being 100 percent convincing (file size, file, and of course the fact that this file isn’t digitally signed unlike the real Steam executable)," a GFI researcher said.

If the user runs Windows Vista or later versions of the platform, the file runs and shows the fake client that looks legitimate.

Wearable Firewall Stops Pacemaker Hacking

Thursday, 19 April 2012 15:10 Written by
Wearable Firewall Stops Pacemaker Hacking

Researchers from Purdue and Princeton universities have developed a solution to what could be catastrophic problem for millions of people who use insulin pumps, pacemakers, and other personal medical devices that rely on wireless communication to function: MedMon — a signal-jamming personal firewall for medical devices that detects potentially malicious communications going into, or coming from, a wearable or implanted device.

After identifying malicious signals, MedMon employs electronic jamming, similar to technology used in military systems, to prevent any potentially harmful wireless commands from getting through to the device and causing it to falter or accept instructions that could cause its wearer harm.

Human Body Vulnerable to Cyberattack

Thursday, 12 April 2012 17:35 Written by
Human Body Vulnerable to Cyberattack

The next frontier of cybercrime could be the human body, a researcher at the Black Hat Security Conference demonstrated. In his presentation, "Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System," Jay Radcliffe showed how a hacker could remotely hack two medical devices used to treat diabetes and trigger them to malfunction — with potentially disastrous results.

"Wireless communication with insulin pumps are not secure, they're not designed to be updated and there's no way of patching them," he told the audience. "It's not like a phone, where you can download a firmware update."

Former Intel Employee Pleads Guilty

Tuesday, 10 April 2012 13:51 Written by
Former Intel Employee Pleads Guilty

A former Intel employee, Biswamohan Pani, pleaded guilty to five counts relating to the illegal download of confidential documents from Intel’s servers. From June 8 through June 11, he downloaded 13 “top secret” Intel design documents from the company’s servers in California, the indictment said.

He copied them from his Intel-issued laptop to an external drive so he could access the documents after he returned the laptop to Intel. He is said to have tried to access the servers again around June 13.

10-Minute Executive Brief

Thursday, 05 April 2012 15:30 Written by
10-Minute Executive Brief

So you've been asked to provide a review or summary for the boss' boss or even higher up. Top, middle or bottom... your rank is moot! You have been chosen for a reason. That reason could be technical, social, or political. The most important thing for you to know is that -- IT IS A BRIEF.

Prime Directive: Simple, simple, simple.

  1. "Today." Where are we now?
  2. "Tomorrow." Where are we going?
  3. "When in doubt - Leave it out."

Executive Reviews or Summary Presentations don't "win" or "sell" any more than a resume gets you a job. They are strictly informative -- purposeful and meaningful. These tools exist to create, focus, redirect, or kill interest. Make sure you understand your purpose and don't stray.

US Utilities Under Daily Cyber-attack

Wednesday, 04 April 2012 11:18 Written by
US Utilities Under Daily Cyber-attack

America’s water and power utilities under daily cyber-attack. America’s utilities face constant cyber-espionage and denial-of-service attacks against industrial-control systems (ICS), according to the team of specialists from the U.S. Department of Homeland Security (DHS) who are called to investigate the worst cyber-related incidents at these utilities.

DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) assisted utilities in network and forensics analysis on seventeen (17) major cases in 2011. Seven (7) of the security incidents originated as spear-phishing attacks via e-mail against utility personnel.

Removing Personal Information from Google

Monday, 26 March 2012 12:28 Written by
Removing Personal Information from Google

Do you know what kind of personal information about you can be found from Internet? Do you know how to remove your name, address, phone number, unwanted pictures, bad publicity, and negative comments from Google and other search results? Do you know how to delete your personal information from online people search database records and the deep web?

Like it or not, Google does not accept complaints for defamatory, inaccurate, or incorrect content in their Search Engine Results. Should you desire to scrub unwanted content from third party websites appearing in Google Web Search Results pages, you must contact the Business Owner of the respective website(s).

In Buddha's Footsteps

Sunday, 18 March 2012 13:42 Written by
In Buddha's Footsteps

Trace your way to the enlightenment and serenity as you travel down the lane through which Lord Buddha gained Nirvana. As you travel through these places you get a sense of believe on the suffering, the cycle of life and death and the philosophy of the eternal bliss, the nirvana.

As you follow the trails of Lord Buddha, who was born in a royal family as Prince Siddhartha Gautam, you learn that every place of Buddhist pilgrimage has its own significance. These famous Buddhist pilgrimages give you knowledge on the various stages of Lord Buddha’s life after he attained Nirvana.

You Can’t Read This Book

Friday, 09 March 2012 18:22 Written by
You Can’t Read This Book

Censorship in the Age of Freedom... Of course you can read this book if you want to. But, as the Observer journalist Nick Cohen argues with passion and wit, there are many important books you cannot read, not because they have been banned but because they have not been written. Their authors have been forced into self-censorship through fear of violence, financial ruin or death.

Pre-publication censorship is rare in today’s world. But there are many other ways of silencing writers. The most effective is fear. For all the advances of secularism, democracy and new technology, the forces of religion, wealth and the state continue to suppress ideas and information. In fact, as Cohen argues, censorship has become more powerful over the past 20 years, not less.

Archive
«StartPrev12345678NextEnd»
Page 5 of 8
Network neutrality is the principle that Internet users should be in control of what content they view and what applications they use on the Internet. The Internet has operated according to this neutrality principle since its earliest days. It is this neutrality that has allowed the internet to innovate and grow. Without equal access the internet dies.