Archive for the ‘Security’ Category

Posted by admin on November - 12 - 2014 0 Comment

Cybercriminals have started a new trend for conducting distributed denial-of-service (DDoS) attacks and rely on a type of DNS (Domain Name System) amplification that leverages text records for making the operation more effective; in some campaigns parts of a press release from the White House has been observed by researchers. The tactic is not new,  [ Read More ]

Categories: IT News, Security
Posted by admin on October - 29 - 2014 0 Comment

A change in the distribution method for Dridex banking Trojan has been observed last week, as attackers rely on Microsoft Word documents with malicious macros in order to download the malware onto targeted computers. Dridex is the latest evolutionary link of the Feodo/Bugat/Cridex Trojan that developed into Geodo. It preserves the info-stealing capabilities of its  [ Read More ]

Categories: IT News, Security, Trojan
Posted by admin on October - 29 - 2014 0 Comment

A browser-based keystroke interception tool called ScanBox has been observed to be wielded by several threat actors targeting a diverse set of organizations in the US, China, Korea and Japan. Unlike other tools used in watering-hole attacks, which are built to deliver exploits that would lead to compromising computers of visitors of a specific website,  [ Read More ]

Categories: IT News, Security
Posted by admin on October - 22 - 2014 0 Comment

A few weeks ago we wrote about compromised websites being used to attack your web routers at home by changing DNS settings. In that scenario the attackers embedded iFrames to do the heavy lifting, the short fall with this method is they require a website to inject the iFrame. As is often the case, tactics  [ Read More ]

Categories: IT News, Security
Posted by admin on October - 7 - 2014 0 Comment

In a joint effort against cybercrime, a study conducted over the period of one year by Kaspersky and INTERPOL revealed that SMS Trojans are among the most frequent threats Android users face. Android accounts for the largest chunk of the mobile operating system market share and it comes as no surprise that most of the  [ Read More ]

Posted by admin on July - 8 - 2014 0 Comment

 A team of security experts in England recently hacked their way into a smart home’s Wi-Fi network. Their inside man? The Lifx color-changing smart LED. As first reported by LEDinside, Context, a UK-based consulting firm specializing in security, recently demonstrated an exploitable weakness within Lifx’s mesh networking protocol, prompting Lifx to put out a quick firmware fix. Initially a  [ Read More ]

Categories: Hacking, IT News, Security
Posted by admin on April - 25 - 2014 0 Comment

According to a report from Akamai, a firm that specializes in cloud and security services, a massive chunk of Distributed Denial of Service (DDoS) attacks originated from China: 43 percent to be exact. That was up by 8 percent when compared with the third quarter of the same year, when only 35 percent of such  [ Read More ]

Categories: Hacking, IT News, Security
Posted by admin on March - 26 - 2014 0 Comment

As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million ATM machines are run on it. Microsoft’s decision to withdraw support for Windows XP poses critical security threat to the economic infrastructure worldwide. MORE REASONS TO UPGRADE Security researchers at Antivirus firm Symantec claimed  [ Read More ]

Categories: IT News, Security
Posted by admin on February - 18 - 2014 0 Comment

Kabar mengejutkan diungkapkan mantan kontraktor rekanan National  Security Agency (NSA) Amerika Serikat (AS) Edward Snowden. Menurut Snowden, intelijen Australia memanfaatkan 2 operator telepon seluler terbesar Indonesia demi memuluskan aksi penyadapan yang dilakukan Australia dan juga AS. Pria yang kerap kali membocorkan rahasia intelijen AS itu, sebagaimana dilansir The New York Times, Sabtu (15/2/2014), memaparkan lembaga  [ Read More ]

Categories: IT News, Security
Posted by admin on December - 5 - 2013 0 Comment

A recent report by the AV-Test Institute found that exploits in Adobe Reader, Adobe Flash, and Java account for 66 percent of Windows systems affected by malware. In a 10-year-plus study, AV-Test uncovered that one exploit for Adobe Reader had nearly 37,000 recorded variants that exploited user machines with high levels of precision. Users with  [ Read More ]

Categories: IT News, Security
  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube

Search Site

Popular Posts

Review: The Apple iP

In these times we have little opportunity for mystical religious ...

Everything you need

The iPhone OS 4.0 event just wrapped up and the ...

The end of SQL and r

The road to SQL started with Dr. E.F. Codd's paper, ...

Microsoft Arc Keyboa

I am losing the war on clutter. Apparently my desk ...

John Shepherd-Barron

John Shepherd-Barron, the Scotsman credited with inventing the world's ...

Sponsors