-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: December 2014
FBI Investigating Whether Companies Are Engaged in Revenge Hacking
The hacked are itching to hack back. So say a dozen security specialists and former law-enforcement officials, who described an intensifying and largely unspoken sense of unease inside many companies after the recent breach of Sony Corp. (6758)’s networks. U.S. … Continue reading
Posted in Uncategorized
Leave a comment
Fake Android The Interview app actually banking Trojan
Malware-slingers have latched onto the torrent of publicity spawned by the controversial film The Interview by stitching together a fake Android app actually designed to swipe online banking credentials. Sony Pictures, stung by criticism that it had given into threats … Continue reading
Posted in Uncategorized
Leave a comment
Bad, bad Internet news: Internet Systems Consortium site hacked
Remember how just last week I told all you dedicated system and network administrators that you weren’t going to be starting your holiday weekend early because of a serious NTP security hole? Well, turn your car around and head back … Continue reading
Posted in Uncategorized
Leave a comment
Hacked? Xbox and Playstation Networks Both Go Down for Christmas
Thousands of people reported Christmas Day problems on the Xbox Live and Playstation gaming networks, as a band of hackers took gleeful credit. The networks, which allow users of the popular consoles to play the video games with a wider online … Continue reading
Posted in Uncategorized
Leave a comment
North Korea’s Internet links restored amid U.S. hacking dispute
North Korea, at the center of a confrontation with the United States over the hacking of Sony Pictures, experienced a complete Internet outage for hours before links were restored on Tuesday, but U.S. officials said Washington was not involved. U.S.-based … Continue reading
Posted in Uncategorized
Leave a comment
Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter
Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting piece of malware to analyze. This is the first time such … Continue reading
Posted in Uncategorized
Leave a comment
Madonna thinks her computer was hacked
Turns out that the Material Girl has had her material stolen, and she’s blaming hackers! This weekend Madonna unexpectedly released six songs on iTunes from her upcoming album “Rebel Heart”. The release was unexpected because “Rebel Heart” wasn’t due to … Continue reading
Posted in Uncategorized
Leave a comment
Alina PoS Malware “Sparks” Off a New Variant
Alina is a fairly well-documented family of malware used to scrape Credit Card (CC) data from Point of Sale (POS) software. We published a series of in-depth write-ups on the capabilities Alina possesses as well as the progression of the … Continue reading
Posted in Uncategorized
Leave a comment
FBI Blames North Korea for Sony Hack
The US Federal Bureau of Investigation says North Korea was behind a cyber-attack on Sony Pictures over a film about its leader Kim Jong-un, BBC News reported. The agency said analysis of malware showed links to North Korea. Sony withdrew the film … Continue reading
Posted in Uncategorized
Leave a comment
Vulnerability in embedded Web server exposes millions of routers to hacking
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet. A compromised router can have wide-ranging implications for the security of home … Continue reading
Posted in Uncategorized
Leave a comment