-
October 16, 2013
Hackers Target Mandiant CEO Via Limo Service
Hackers Target Mandiant CEO Via Limo Service: Hackers are apparently stalking Kevin Mandia, chief executive of the cybersecurity company Mandiant. The head of the company that famously highlighted Chinese cyber-espionage efforts earlier in the year may be feeling the effect of retaliation, as evidenced by a targeted attack he uncovered that makes use of his […]
-
October 15, 2013
Stealthy technique fingerprints smartphones by measuring users’ movements
Stealthy technique fingerprints smartphones by measuring users’ movements: Computer scientists have devised a technique that could one day allow advertisers or law enforcement organizations to surreptitiously fingerprint smartphones. The attack, recently unveiled by a team of researchers from Stanford University, could be attractive because it works against virtually any smartphone equipped with an “accelerometer.” That’s […]
-
October 14, 2013
Unauthorized Access Backdoor found in D-Link
Unauthorized Access Backdoor found in D: A number of D-Link routers reportedly have an issue that makes them susceptible to unauthorized backdoor access. The researcher Craig, specialized on the embedded device hacking – demonstrated the presence of a backdoor within some DLink routers that allows an attacker to access the administration web interface of network […]
-
October 14, 2013
Facebook phishing attack preys on users desiring to know profile viewers
Facebook phishing attack preys on users desiring to know profile viewers: Want to know who is visiting your Facebook page? You can’t – and even though that point is reinforced on the social media giant’s help page, it has not stopped some clever phishers from trying to trick people into thinking there is a new […]
-
October 14, 2013
Your city is spying on you: From iPhones to cameras, you are being watched right now
Your city is spying on you: From iPhones to cameras, you are being watched right now: We’d like to think of smart technology as a benevolent omniscience, always acting in our interests. That’s certainly the pitch by technology giants, governments, and start-ups alike. But the proliferation of surveillance mechanisms isn’t an accident. Governments, who ought […]
-
October 14, 2013
Adobes source code was parked on hackers unprotected server
Adobes source code was parked on hackers unprotected server: Hackers capitalize on other people’s mistakes. But they make their own as well.Case in point: A massive breach of Adobe Systems’ network was discovered after the source code of numerous products, including the Web application development platform ColdFusion, sat parked on a hacker’s unprotected Web server […]
-
October 11, 2013
MCSO arrests 2 suspects in credit card scheme; thousands at risk
MCSO arrests 2 suspects in credit card scheme; thousands at risk: Two people are accused of fraudulently using the credit card information of patients of Scottsdale Dermatology and its offices around the Valley. Winfred Aurelious Dick Jr., 25, and Brittney Davidson, 24, both of Phoenix, were arrested and booked into the Fourth Avenue Jail on […]
-
October 10, 2013
Self-XSS attack explained
Self-XSS attack explained: I’ve seen a lot of people talking about recent social-engineering attacks on Facebook, but no one has really outlined the mechanics behind them. So hopefully this video provides some light on the issue – I work on the team at Facebook that combats these attacks. This video covers both share-baiting (a pure […]
-
October 9, 2013
Android app “bit web server” remotely vulnerable
Steve Austin: Android app “bit web server” from ice cold apps suffers from an insecure default configuration which allows for at least injection of php web shell. Devices that are rooted will allow for said shell to be uid 0, or root. The issue was reported to the developer yesterday immediately post discovery. It is […]
-
October 3, 2013
5 reasons not to root Android
5 reasons not to root Android: Android is well known for its seemingly never-ending customization options and its permissive rooting credentials (well, among other things). Distributions that cannot be modified to enable elevated permissions are quite rare, as enthusiasts seek to have virtually every possible feature available at their disposal. But should you pursue that […]