-
October 30, 2013
Car hackers mess with speedos, odometers, alarms and locks
Car hackers mess with speedos, odometers, alarms and locks: When Sumers and Zulauf began their research, they did not let the lack of computer documentation, the exorbitant costs of proprietary computer analysis kits or tight-lipped mechanics stop them. Speaking at the Breakpoint security conference in Melbourne, the researchers from automtive startups Automatic and Motiv Power […]
-
October 30, 2013
Visual investigations of botnet command and control behavior
Visual investigations of botnet command and control behavior: Malware authors seem to prefer to use low port numbers, whereas legitimate software often uses higher ports. In general, popular malware command and control ports were clustered below port 10,000, whereas the density of ports below 10,000 used on the legitimate network was relatively low. The difference […]
-
October 30, 2013
BBC News
BBC News: Cyber criminals are planting chips in electric irons and kettles to launch spam attacks, reports in Russia suggest. State-owned channel Rossiya 24 even showed footage of a technician opening up an iron included in a batch of Chinese imports to find a “spy chip” with what he called “a little microphone”. Its correspondent […]
-
October 30, 2013
I challenged hackers to investigate me and what they found out is chilling
I challenged hackers to investigate me and what they found out is chilling: Two months earlier I challenged Nicholas Percoco, senior vice president of SpiderLabs, the advanced research and ethical hacking team at Trustwave, to perform a personal “pen-test,” industry-speak for “penetration test.” The idea grew out of a cover story I wrote for Forbes […]
-
October 29, 2013
Confirmed: Obama’s campaign emails and Twitter links were hacked by the Syrian Electronic Army
Confirmed: Obama’s campaign emails and Twitter links were hacked by the Syrian Electronic Army: In a statement on Twitter, the SEA said it “accessed many Obama campaign emails accounts to assess his terrorism capabilities. They are quite high.” Quartz has confirmed with the campaign staffer whose compromised email address is included in the posting that […]
-
October 29, 2013
Adobe network attack earlier this month compromised at least 38 million users
Adobe network attack earlier this month compromised at least 38 million users: Software firm Adobe had its network compromised earlier this month, and information that was leaked apparently included 2.9 million customer names, encrypted credit or debit card numbers, expiration dates, and “other information relating to customer orders.”However, KrebsOnSecurity reports today that the Adobe breach had in fact […]
-
October 17, 2013
Hardware Keylogger used by Card skimmers to steal Credit Cards at Nordstrom Store
Hardware Keylogger used by Card skimmers to steal Credit Cards at Nordstrom Store: Three men allegedly installed Credit Card Skimming keylogger at into cash registers in a Nordstrom department store in the Florida. Those Keyloggers were connected via a keyboard cord between the keyboard and the computer to intercept the information transmitted between the two […]
-
October 16, 2013
Antivirus firm ESET and BitDefender website Hijacked by Pro
Antivirus firm ESET and BitDefender website Hijacked by Pro: A pro-Palestinian hacktivist group KDMS Team, who recently managed to briefly hijack the Metasploit website of security firm Rapid7 and become popular after Hacking Worlds largest Web Hosting Network Leaseweb website and antivirus vendors AVG, Avira as well as mobile messaging service WhatsApps websites.Now even I have to say […]
-
October 16, 2013
New Zealand Government Forcing Internet Companies and Network Operators to provide Interception capability
New Zealand Government Forcing Internet Companies and Network Operators to provide Interception capability: In August the New Zealand has passed a bill that radically expands the powers of The Government Communications Security Bureau (GCSB), an intelligence agency of the New Zealand government, equivalent of the National Security Agency (NSA). The bill demands the companies and other […]
-
October 16, 2013
Lavabit gets new crypto key, gives users 72 hours to recover e-mails
Lavabit gets new crypto key, gives users 72 hours to recover: Former users of the Lavabit encrypted e-mail service have until Thursday night to change their passwords so they can recover data that has been unavailable since the site abruptly shut down two months ago. Lavabit founder Ladar Levison said he was temporarily reinstating the […]