Monthly Archives: March 2015

Syrian Electronic Army hacks Bluehost, Justhost, Hostgator, Fastdomain and Hostmonster

Endurance Group’s Hosting Companies BlueHost, Hostgator, Justhost, FastDomain and HostMonstor Hacked By Syrian Electronic Army After lying low for a while, the pro Assad regime hacker group Syrian Electronic Army (SEA) today hacked the Endurance International Group Inc held hosting … Continue reading

Posted in Uncategorized | Leave a comment

Starry-eyed hackers stuff Eurovision’s voting app

The Eurovision Song Contest has been targeted by obsessed hackers who stuffed the voting ballots during the final qualifier song performance. Votes flooded into the Melodifestivalen app during the final performance by Jon Henrik Fjällgren, forcing the contest organisers to … Continue reading

Posted in Uncategorized | Leave a comment

Slack Got Hacked

Slack, the super-slick team chat-room service, is getting popular fast. Word around the rumor mill is that it’s currently raising funds at a $2.8 billion valuation. And in the words of the late, great Biggie Smalls: Mo Money, Mo Problems. … Continue reading

Posted in Uncategorized | Leave a comment

Health records are the new goldmine for hackers

The rise in health data breach headlines, may not necessarily suggest an increase in actual data breaches. It’s possible that organizations are just getting better at discovering that they’ve been breached, so it gets more attention than it would have … Continue reading

Posted in Uncategorized | Leave a comment

Desafíos con sistemas de detección de intrusos basado en host

Sistemas de detección de intrusos basado en host están dirigidas a la recopilación de información acerca de la actividad en un solo sistema en particular, o de host. Estos funcionarios basados en host, que se refieren a veces como sensores, … Continue reading

Posted in Uncategorized | Leave a comment

Malicious user hides trojan links in cloned Steam Greenlight pages

A malicious user exploited the somewhat open submission structure of Steam’s Greenlight section over the weekend to briefly hide malware links in cloned versions of legitimate game pages. Polygon reports that a Steam user going by the handle bluebunny14 posted … Continue reading

Posted in Uncategorized | Leave a comment

BlackHat talk hibernated over 0-day in SAP’s Afaria mobile manager

Alexander Polyakov has been forced to withdraw a talk detailing dangerous vulnerabilities into SAP’s mobile device management product Afaria scheduled to be given at BlackHat Asia Pacific this week. The prolific SAP hacker and chief technology officer of ERPScan says … Continue reading

Posted in Uncategorized | Leave a comment