Stolen credentials, basic security lapses at core of 2012 breaches
A common thread could be weaved through the high profile data breaches that took place in 2012. Attackers are targeting basic security lapses and configuration errors or bypassing security systems...
View ArticleDetecting Compromised SSL Certificates Using Nessus
When Thieves Target SSL CertificatesSSL is one of the most commonly used protocols to provide encryption for a variety of different applications. As such, it has come under great scrutiny over the...
View ArticleRansomware: Extorting Money by Panic and Pressure
We have blogged in the past about Ransomware being a growing menace and that ONE SHOULD NOT PAY RANSOM if affected. Ransomware has now raised its ugly head up once again. Writers of...
View ArticlePharmaceutical scammers spamvertise YouTube themed emails, entice users into...
Pharmaceutical scammers are currently spamvertising a YouTube themed email campaign, attempting to socially engineer users into clicking on the links found in the legitimately looking emails.Upon...
View ArticleESA EUROPEAN SPACE AGENCY LEAK BY LULZSEC CHILE
As always this information is for educational purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to...
View ArticleFacebook Camera App Vulnerable to Man in The Middle Attack
Egypt-based security researcher reported that Facebook Camera App formobiles are Vulnerable to Man in The Middle Attack, that allow anattacker to tap the network and hijack Camera users accounts...
View ArticleOPTICUM GMBH Site Vulnerabilities (Scan)
http://www.opticum-gmbh.de Scan ReportMade By H3Cio5.BrainBasic InformationVersionNULLServerApache/2.2.22WWWRootNULLuserNULLIsAdmin-1DatabaseNULLSa_PasswordHashNULLVulnerability...
View ArticleChinese Site -xiaobin.com.cn SQLi (Leak)
As always this information is for educational purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to...
View ArticleInnovative VPN Routers Help Increase Internet Privacy for Home Users
As concerned consumers turn to VPN for privacy, Sabai Technology puts easiest to use VPN Routers on post-holiday discount.I recommend Sabai Technology VPN Routers to everyone and anyone. They are very...
View ArticlePolicyPak Software Delivers Security and Lockdown Management for FoxIT Reader
The new pak gives IT admins the ability to manage, lockdown and remediate the PDF reader.If you’re going to be deploying FoxIT Reader to all of your client machines, you’re going to want to make sure...
View ArticleThree Pieces of Malware Found to Target Korean Gamers
esearchers from Microsoft’s Malware Protection Center have analyzed three pieces of malware that appear to be utilized to target gamers from Korea, particularly users who play card games.Experts...
View ArticleNew Year’s Resolutions for Cyber Security
January is often viewed as a chance to start fresh and to improve on the previous year by making modest resolutions that hopefully we keep throughout the year.For credit unions, January presents an...
View ArticleWhat criminals do with stolen passwords
Not long ago, PCs compromised by malware were put to a limited number of fraudulent uses, including spam, click fraud and denial-of-service attacks. These days, computer crooks are extracting and...
View ArticleHuge rise in social media 'crimes'
The number of alleged crimes involving Facebook and Twitter has increased nearly eight-fold in four years, according to police figures.There were 653 people charged in 2012 out of 4,908 offences...
View ArticleRecord-breaking 17.4 million Android and iOS devices activated on Christmas...
More Android and iOS devices were activated on Christmas Day this year than on any other day. According to analytics firm Flurry, 17.4 million Android and iOS devices were activated during the...
View ArticleMODx Revolution CMS Brute Force (BF), Cross-Site Request Forgery (CSRF),...
I want to warn you about multiple vulnerabilities in MODx Revolution.These are Brute Force, Cross-Site Request Forgery, Abuse of Functionalityand Insufficient Anti-automation vulnerabilities in MODx....
View ArticleKaspersky Lab Boosts Linux Mail Security
Kaspersky Lab ZAO gave its Kaspersky Security for Linux Mail Server a few strong tweaks in the security area with an update that bolsters protection against spam and malware spread by e-mail, giving...
View ArticleRansomware Takes New Turn for Money - Online Surveys
A new ransomware scam has taken an interesting twist – rather than simply demanding payment, the attackers want the victims to fill out a survey.It is a new tack for a scam that traditionally relies on...
View ArticleInternet Explorer Select Element RCE - CVE-2011-1999 ?
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" id="doctype1"><html><head><script...
View ArticleExploit Development: PHP-CGI Remote Code Execution – CVE-2012-1823
The CVE-2012-1823 PHP-CGI exploit was, quite possibly, one of the most groundbreaking exploits of 2012. In a year that brought us MS-12-020 (the most hyped bug in my recollection), multiple Java 0day...
View Article