-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: February 2015
Zero Day Weekly: Superfish attacks, FBI GameoverZeus bounty, Komodia in Lavasoft
Almost a week after revelations surfaced that Lenovo preinstalled dangerous ad-injecting software on consumer laptops, attackers took complete control of the company’s valuable Lenovo.com domain name, a coup that allowed them to intercept the PC maker’s e-mail and impersonate its … Continue reading
Posted in Uncategorized
Leave a comment
Botnet of Joomla servers furthers DDoS-for-hire scheme
Researchers have uncovered a distributed denial-of-service (DDoS) attack campaign that takes advantage of Joomla servers with a vulnerable Google Maps plug-in installed. Akamai’s Prolexic Security Engineering & Research Team (PLXsert) worked with PhishLabs’ Research, Analysis, and Intelligence Division (R.A.I.D) to … Continue reading
Posted in Uncategorized
Leave a comment
¿Cuál es mejor IDS o IPS?
Según especializados de empresa de seguridad informática, los sistemas de detección de intrusiones de red (NIDS), y la Red de prevención de intrusiones (PIN) son parte común de una aplicación firewall; esta pareja con Host IDS (HIDS) o Host IPS … Continue reading
Posted in Uncategorized
Leave a comment
FBI Offers $3 Million Reward For Russian Hacker
Evgeniy Mikhailovich Bogachev allegedly ran a network of hackers responsible for the development of malware known as Gameover Zeus and Cryptolocker. Zeus is a trojan horse program which is thought to have infected around 1 million computers around the world, … Continue reading
Posted in Uncategorized
Leave a comment
Mozilla Fixes 17 Vulnerabilities in Firefox 36
While the number of fixed vulnerabilities is higher than usual, only four of the flaws have been rated critical. One of the critical issues is a buffer overflow in the libstagefright library (CVE-2015-0829). The bug, reported by a security researcher … Continue reading
Posted in Uncategorized
Leave a comment
Superfish’-style vulnerability found in games and parental control software
A serious security problem caused by advertising software installed on Lenovo laptops is more widespread than first thought, security researchers have warned. The ‘Superfish’ vulnerability affected dozens of laptops shipped between September and December 2014, exposing users to a hijacking … Continue reading
Posted in Uncategorized
Leave a comment
How the NSA’s Firmware Hacking Works and Why It’s So Unsettling
One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code. The Kaspersky researchers who uncovered this said its ability … Continue reading
Posted in Uncategorized
Leave a comment
DARKLEAKS: WHERE THE HIDDEN TRUTH CAN BE BOUGHT FOR BITCOIN
The truth, in 2015, will set you free. Of some Bitcoin. It’s a poorly kept secret that the U.S. Government has waged war against the whistleblowers President Obama once swore to protect. Wikileaks founder Julian Assange has been on the … Continue reading
Posted in Uncategorized
Leave a comment
Google unleashes tame botnet to hunt XSS in cloudy code
Google has unleashed its own application security scanner, potentially rescuing admins from ‘fiddly’ existing offerings. The scanner will check code running in App Engine for cross-site scripting (XSS) and mixed content vulnerabilities. Choc Factory engineering head Rob Mann says its … Continue reading
Posted in Uncategorized
Leave a comment
Celebrity chef Jamie Oliver’s website hacked, redirects to exploit kit
The team at jamieoliver.com found a low-level malware problem and dealt with it quickly. The site is now safe to use. We have had only a handful of comments from users over the last couple of days, and no-one has … Continue reading
Posted in Uncategorized
Leave a comment