-
December 5, 2013
Death threats fly as $100 million of Bitcoins disappear from Sheep Marketplace
Death threats fly as $100 million of Bitcoins disappear from Sheep Marketplace: A slew of angry user complaints have since alleged that the whole site had been operating for some time as a honeypot designed to collect Bitcoins in advance of a prepared heist, an accusation that if true would be an unprecedented example of […]
-
December 5, 2013
Report: Huawei CEO says company has exited U.S. network gear market
Report: Huawei CEO says company has exited U.S. network gear market: Huawei founder and CEO Ren Zhengfei said the company had decided to exit the U.S. network equipment market, according to media reports, because of continuing disputes between the U.S. and China and lingering concerns, which the company has called unfounded, that Huawei itself poses a security […]
-
December 4, 2013
Simple But Effective Point
Simple But Effective Point: Point-of-sale (POS) skimmers — fraud devices made to siphon bank card and PIN data at the cash register — have grown in sophistication over the years: A few months back, this blog spotlighted a professionally made point-of-sale skimmer that involved some serious hacking inside the device. Today’s post examines a comparatively […]
-
December 4, 2013
Hey Zollard, leave my Internet of Things alone!
Hey Zollard, leave my Internet of Things alone!: We’ve long been tracking exploit attempts against web servers, notably CMS hosts, ColdFusion, and vanilla PHP/CGI servers. Of late, we’ve observed a fairly large increase in PHP exploit attempts. So Symantec’s recent report about Linux.Darlloz targeting “The Internet of Things” was of particular interest. Recently I noted […]
-
December 4, 2013
16-30 November 2013 Cyber Attacks Timeline
16-30 November 2013 Cyber Attacks Timeline: This month will be probably remembered for the discovery of the giant breach targeting Cupid Media and involving potentially 42 million users. However, this was not the only remarkable breach of November: chronicles report of 77,000 customers of Vodafone Island having their details leaked. Other interesting events involve a […]
-
December 4, 2013
How Classified NSA Exploit tools RADON and DEWSWEEPER Work
How Classified NSA Exploit tools RADON and DEWSWEEPER Work: Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations. The revelation isn’t surprising, the security community is aware of the great effort spent by governments on cyber […]
-
December 4, 2013
How good is your cyberincident-response plan?
How good is your cyberincident-response plan?: Cybercriminals are successfully targeting organizations of all sizes across all industry sectors. Recent analyst and media reports make clear that attacks are becoming increasingly sophisticated, more frequent, and their consequences more dire. One global company that suffered a large breach spent over $100 million on investigating the incident and […]
-
December 4, 2013
Found: hacker server storing two million pilfered paswords
Found: hacker server storing two million pilfered paswords: Researchers have unearthed a server storing more than two million pilfered login credentials for all kinds of user accounts, including those on Facebook, Yahoo, Google, Twitter, and a handful of other websites. More than 1.5 million of the user names and passwords are for website accounts, including […]
-
December 4, 2013
Bitcoin Thefts Surge, DDoS Hackers Take Millions
Bitcoin Thefts Surge, DDoS Hackers Take Millions: Earlier this month, for example, Bitcoin Internet Payment System (BIPS), a Denmark-based Bitcoin payment processor, suffered a denial-of-service (DDoS) attack. Unfortunately for users of the company’s free online wallets for storing bitcoins, the DDoS attack was merely a smokescreen for a digital heist that quickly drained numerous wallets, […]
-
December 3, 2013
Attacking MS SQL Server to Gain System Access
Attacking MS SQL Server to Gain System Access: All systems and database administrators will agree that password complexity does not go very far when it comes to SQL servers. Whether this is done to keep troubleshooting simple for support staff or it is simply a matter of underestimating the risks, it doesn’t really matter. What […]