Monthly Archives: February 2015

Zero Day Weekly: Superfish attacks, FBI GameoverZeus bounty, Komodia in Lavasoft

Almost a week after revelations surfaced that Lenovo preinstalled dangerous ad-injecting software on consumer laptops, attackers took complete control of the company’s valuable Lenovo.com domain name, a coup that allowed them to intercept the PC maker’s e-mail and impersonate its … Continue reading

Posted in Uncategorized | Leave a comment

Botnet of Joomla servers furthers DDoS-for-hire scheme

Researchers have uncovered a distributed denial-of-service (DDoS) attack campaign that takes advantage of Joomla servers with a vulnerable Google Maps plug-in installed. Akamai’s Prolexic Security Engineering & Research Team (PLXsert) worked with PhishLabs’ Research, Analysis, and Intelligence Division (R.A.I.D) to … Continue reading

Posted in Uncategorized | Leave a comment

¿Cuál es mejor IDS o IPS?

Según especializados de empresa de seguridad informática, los sistemas de detección de intrusiones de red (NIDS), y la Red de prevención de intrusiones (PIN) son parte común de una aplicación firewall; esta pareja con Host IDS (HIDS) o Host IPS … Continue reading

Posted in Uncategorized | Leave a comment

FBI Offers $3 Million Reward For Russian Hacker

Evgeniy Mikhailovich Bogachev allegedly ran a network of hackers responsible for the development of malware known as Gameover Zeus and Cryptolocker. Zeus is a trojan horse program which is thought to have infected around 1 million computers around the world, … Continue reading

Posted in Uncategorized | Leave a comment

Mozilla Fixes 17 Vulnerabilities in Firefox 36

While the number of fixed vulnerabilities is higher than usual, only four of the flaws have been rated critical. One of the critical issues is a buffer overflow in the libstagefright library (CVE-2015-0829). The bug, reported by a security researcher … Continue reading

Posted in Uncategorized | Leave a comment

Superfish’-style vulnerability found in games and parental control software

A serious security problem caused by advertising software installed on Lenovo laptops is more widespread than first thought, security researchers have warned. The ‘Superfish’ vulnerability affected dozens of laptops shipped between September and December 2014, exposing users to a hijacking … Continue reading

Posted in Uncategorized | Leave a comment

How the NSA’s Firmware Hacking Works and Why It’s So Unsettling

One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code. The Kaspersky researchers who uncovered this said its ability … Continue reading

Posted in Uncategorized | Leave a comment