Monthly Archives: February 2015

Zero Day Weekly: Superfish attacks, FBI GameoverZeus bounty, Komodia in Lavasoft

Almost a week after revelations surfaced that Lenovo preinstalled dangerous ad-injecting software on consumer laptops, attackers took complete control of the company’s valuable Lenovo.com domain name, a coup that allowed them to intercept the PC maker’s e-mail and impersonate its … Continue reading

Posted in Uncategorized | Leave a comment

Botnet of Joomla servers furthers DDoS-for-hire scheme

Researchers have uncovered a distributed denial-of-service (DDoS) attack campaign that takes advantage of Joomla servers with a vulnerable Google Maps plug-in installed. Akamai’s Prolexic Security Engineering & Research Team (PLXsert) worked with PhishLabs’ Research, Analysis, and Intelligence Division (R.A.I.D) to … Continue reading

Posted in Uncategorized | Leave a comment

¿Cuál es mejor IDS o IPS?

Según especializados de empresa de seguridad informática, los sistemas de detección de intrusiones de red (NIDS), y la Red de prevención de intrusiones (PIN) son parte común de una aplicación firewall; esta pareja con Host IDS (HIDS) o Host IPS … Continue reading

Posted in Uncategorized | Leave a comment

FBI Offers $3 Million Reward For Russian Hacker

Evgeniy Mikhailovich Bogachev allegedly ran a network of hackers responsible for the development of malware known as Gameover Zeus and Cryptolocker. Zeus is a trojan horse program which is thought to have infected around 1 million computers around the world, … Continue reading

Posted in Uncategorized | Leave a comment

Mozilla Fixes 17 Vulnerabilities in Firefox 36

While the number of fixed vulnerabilities is higher than usual, only four of the flaws have been rated critical. One of the critical issues is a buffer overflow in the libstagefright library (CVE-2015-0829). The bug, reported by a security researcher … Continue reading

Posted in Uncategorized | Leave a comment

Superfish’-style vulnerability found in games and parental control software

A serious security problem caused by advertising software installed on Lenovo laptops is more widespread than first thought, security researchers have warned. The ‘Superfish’ vulnerability affected dozens of laptops shipped between September and December 2014, exposing users to a hijacking … Continue reading

Posted in Uncategorized | Leave a comment

How the NSA’s Firmware Hacking Works and Why It’s So Unsettling

One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code. The Kaspersky researchers who uncovered this said its ability … Continue reading

Posted in Uncategorized | Leave a comment

DARKLEAKS: WHERE THE HIDDEN TRUTH CAN BE BOUGHT FOR BITCOIN

The truth, in 2015, will set you free. Of some Bitcoin. It’s a poorly kept secret that the U.S. Government has waged war against the whistleblowers President Obama once swore to protect. Wikileaks founder Julian Assange has been on the … Continue reading

Posted in Uncategorized | Leave a comment

Google unleashes tame botnet to hunt XSS in cloudy code

Google has unleashed its own application security scanner, potentially rescuing admins from ‘fiddly’ existing offerings. The scanner will check code running in App Engine for cross-site scripting (XSS) and mixed content vulnerabilities. Choc Factory engineering head Rob Mann says its … Continue reading

Posted in Uncategorized | Leave a comment

Celebrity chef Jamie Oliver’s website hacked, redirects to exploit kit

The team at jamieoliver.com found a low-level malware problem and dealt with it quickly. The site is now safe to use. We have had only a handful of comments from users over the last couple of days, and no-one has … Continue reading

Posted in Uncategorized | Leave a comment