A Guide of confirming a hacked legit service by Blackhole Exploit Kit
// #MalwareMustDie - Crusaders diary// @unixfreaxjp of MMD is responsible 100% of this check.// A Guide of confirming a hacked legit service by Blackhole Exploit Kit.//// Background:// while I was...
View Article[SECURITY] [DSA 2591-1] mahara security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- -------------------------------------------------------------------------Debian Security Advisory DSA-2591-1...
View Article[SECURITY] [DSA 2592-1] elinks security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- -------------------------------------------------------------------------Debian Security Advisory DSA-2592-1...
View ArticleMassachusetts Institute of Technology Site XSS Vulnerability
MASSACHSETS INST OF TECH WEBSITE VUL TO XSS....FOUND BY R3SIST3R FROM TEAM R3SISTANC3ADMIN PATCH YOUR WEBSITEURL...
View ArticleMetasploit: RealPlayer RealMedia File Handling Buffer Overflow
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and...
View ArticleSPIE Leaders Seek Support for a National Photonics Initiative
A National Photonics Initiative ― a key recommendation in the recent National Academies report, “Optics and Photonics, Essential Technologies for Our Nation”― would enable a strategic approach to...
View ArticleMercator Advisory Group Report: Data Privacy and Security: A Review of Global...
As payment technologies have evolved, so has the global consumer preference for noncash payment options. While electronic payment methods offer unique advantages over cash and other traditional payment...
View ArticleNew Android Trojan Capable of Launching DDOS Attacks, Sending SMSs
Security researchers from Russian firm Doctor Web have come across a new Android Trojan they call Android.DDoS.1.origin. The piece of malware can be used for various malicious tasks, including to...
View ArticleIP.Board 3.1.x, 3.2.x, 3.3.x & 3.4.x Critical Security Update
Security Update: 27th December 2012A security evaluation has revealed a critical security issue and we are releasing a critical security update today to patch this issue.InstructionsWe are providing a...
View ArticleChinese Hackers Suspected in Cyber Attack on Council on Foreign Relations
Advanced cyberespionage attack employed 'drive-by' method on CFR websiteComputer hackers traced to China carried out an advanced cyberespionage attack against one of America’s most elite foreign policy...
View ArticleBank of America & CitiBank DDoS Attack
Izz ad-Din al-Qassam Cyber Fighters compromised the sites of CitiBank and Bank of America via distributed denial-of-service (DDOS) attacks twice yesterday. Reportedly Bank of America has been targeted...
View ArticleFree Batch MD5 Hash Cracker
Back in the old days, I used to be into batch coding, that isn't the case nowadays, but I just wanted to share one of the cool projects I made.It is a MD5 hash cracker. Very simply put, it checks the...
View ArticleUT Bank Ghana Ltd DB Compromise Via SQLi (Leak)
As always this information is for educational purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to...
View ArticleThe privacy concern in smart grid system, is it real, or not??
The illegal access to our electrical information in smart grid system can lead to many big problems such as theft, crime and damages of our electrical machines. The electrical information such as how...
View ArticleObligations and risks of ITsecurity is the same for large or small firms
As head of the Privacy and Cyber Crime Institute at Ryerson University and chair of the Law and Business Department at the Ted Rogers School of Management, Avner Levin is a frequent presenter at...
View ArticleDoJ wants to indict state-sponsored hackers. What is the real purpose?
The last couple of years has been characterized by the raise of state-sponsored cyber attacks, governments have increased cyber capabilities to defend their critical infrastructures from offensive...
View ArticleChina approves tighter rules on internet access
China has tightened its rules on internet usage to enforce a previous requirement that users fully identify themselves to service providers.The move is part of a package of measures which state-run...
View ArticleCisco: Attack of the Phones
Any business executive will agree that the compromising of infrastructure & communications systems brings about a level of excitement that's best left for the cinema. There's an incredible amount...
View ArticleOrganised crime gets smart with technology
NSW's top crime-fighting agency has admitted it is being outsmarted by criminals who use BlackBerry phones and online telephone services such as Skype to prevent their illicit conversations being taped...
View ArticleChat Logs From A Number of Hacking Group Operational Names
Below are some of the people exploiting systems around the world and you can see how intelligent they really are just by some brief log conversations. If you are offended by fowl language than I...
View Article