Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Stolen credentials, basic security lapses at core of 2012 breaches

A common thread could be weaved through the high profile data breaches that took place in 2012. Attackers are targeting basic security lapses and configuration errors or bypassing security systems...

View Article


Image may be NSFW.
Clik here to view.

Detecting Compromised SSL Certificates Using Nessus

When Thieves Target SSL CertificatesSSL is one of the most commonly used protocols to provide encryption for a variety of different applications. As such, it has come under great scrutiny over the...

View Article


Image may be NSFW.
Clik here to view.

Ransomware: Extorting Money by Panic and Pressure

We have blogged in the past about Ransomware being a growing menace and that ONE SHOULD NOT PAY RANSOM if affected. Ransomware has now raised its ugly head up once again. Writers of...

View Article

Image may be NSFW.
Clik here to view.

Pharmaceutical scammers spamvertise YouTube themed emails, entice users into...

Pharmaceutical scammers are currently spamvertising a YouTube themed email campaign, attempting to socially engineer users into clicking on the links found in the legitimately looking emails.Upon...

View Article

ESA EUROPEAN SPACE AGENCY LEAK BY LULZSEC CHILE

As always this information is for educational purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to...

View Article


Facebook Camera App Vulnerable to Man in The Middle Attack

Egypt-based security researcher reported that Facebook Camera App formobiles are Vulnerable to Man in The Middle Attack, that allow anattacker to tap the network and hijack Camera users accounts...

View Article

OPTICUM GMBH Site Vulnerabilities (Scan)

http://www.opticum-gmbh.de Scan ReportMade By H3Cio5.BrainBasic InformationVersionNULLServerApache/2.2.22WWWRootNULLuserNULLIsAdmin-1DatabaseNULLSa_PasswordHashNULLVulnerability...

View Article

Chinese Site -xiaobin.com.cn SQLi (Leak)

As always this information is for educational purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to...

View Article


Innovative VPN Routers Help Increase Internet Privacy for Home Users

As concerned consumers turn to VPN for privacy, Sabai Technology puts easiest to use VPN Routers on post-holiday discount.I recommend Sabai Technology VPN Routers to everyone and anyone. They are very...

View Article


PolicyPak Software Delivers Security and Lockdown Management for FoxIT Reader

The new pak gives IT admins the ability to manage, lockdown and remediate the PDF reader.If you’re going to be deploying FoxIT Reader to all of your client machines, you’re going to want to make sure...

View Article

Three Pieces of Malware Found to Target Korean Gamers

esearchers from Microsoft’s Malware Protection Center have analyzed three pieces of malware that appear to be utilized to target gamers from Korea, particularly users who play card games.Experts...

View Article

New Year’s Resolutions for Cyber Security

January is often viewed as a chance to start fresh and to improve on the previous year by making modest resolutions that hopefully we keep throughout the year.For credit unions, January presents an...

View Article

What criminals do with stolen passwords

Not long ago, PCs compromised by malware were put to a limited number of fraudulent uses, including spam, click fraud and denial-of-service attacks. These days, computer crooks are extracting and...

View Article


Huge rise in social media 'crimes'

The number of alleged crimes involving Facebook and Twitter has increased nearly eight-fold in four years, according to police figures.There were 653 people charged in 2012 out of 4,908 offences...

View Article

Image may be NSFW.
Clik here to view.

Record-breaking 17.4 million Android and iOS devices activated on Christmas...

 More Android and iOS devices were activated on Christmas Day this year than on any other day. According to analytics firm Flurry, 17.4 million Android and iOS devices were activated during the...

View Article


MODx Revolution CMS Brute Force (BF), Cross-Site Request Forgery (CSRF),...

I want to warn you about multiple vulnerabilities in MODx Revolution.These are Brute Force, Cross-Site Request Forgery, Abuse of Functionalityand Insufficient Anti-automation vulnerabilities in MODx....

View Article

Kaspersky Lab Boosts Linux Mail Security

Kaspersky Lab ZAO gave its Kaspersky Security for Linux Mail Server a few strong tweaks in the security area with an update that bolsters protection against spam and malware spread by e-mail, giving...

View Article


Ransomware Takes New Turn for Money - Online Surveys

A new ransomware scam has taken an interesting twist – rather than simply demanding payment, the attackers want the victims to fill out a survey.It is a new tack for a scam that traditionally relies on...

View Article

Internet Explorer Select Element RCE - CVE-2011-1999 ?

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" id="doctype1"><html><head><script...

View Article

Exploit Development: PHP-CGI Remote Code Execution – CVE-2012-1823

The CVE-2012-1823 PHP-CGI exploit was, quite possibly, one of the most groundbreaking exploits of 2012. In a year that brought us MS-12-020 (the most hyped bug in my recollection), multiple Java 0day...

View Article
Browsing all 8064 articles
Browse latest View live