A router-to-router bot first detected two years ago has evolved - and now has the capability to reconfigure the firewalls of its victims. The Lightaidra malware captured by security researcher TimelessP is an IRC-based mass router scanner/exploiter that's rare because it spreads through consumer network devices instead of vulnerable Windows PCs.
TimelessP detected the router-to-router bot using a honeypot. The bot, first developed in 2012, targets consumer grade cable and DSL modems with default usernames and passwords in order to spread. Lightaidra requires Linux to be running on the device in order to infect equipment. The primary use of the malware is in running DDoS attacks.
Read moreThe goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it could be in large-scale compromises of popular Web sites or financial databases. The methods may change, but the aim is the same.
In most cases, attackers first try to get some sort of malware onto user machines, as that’s the shortest route between them and your data. But if that isn’t feasible for some reason, another popular method of compromise is the man-in-the-middle attack. As the name suggests, this attack vector involves the attacker placing himself – or his malicious tools – between the victim and a valuable resource.
Read morePopular Gmail service could not resist hacking, which led to the promulgation of a huge addresses database. Recently, the same thing happened with Yandex and Mail.ru. 4 929 090 gmail.com accounts became public. Authenticity has not been confirmed, but it is said about 60 percent of current addresses and passwords.
People perceived this information quite easily, saying that such fraud is not new. This is certainly true, but many users find themselves in the lists of exposed information, then they changed the passwords and began to be more careful to the security of their data. From the fact that bases appear from many services, messages from "Yandex" and Mail.ru are correct, and it is not the result of data leakage.
Read moreSecurity researcher Will Dormann of the US Computer Emergency Response Team (CERT) has reported this week that over 350 apps from the Google Play and Amazon App stores have been compromised due to a flaw that fails to validate certificates over a secure socket layer.
The bug, which opens up many popular mobile applications such as the eBay mobile shopper and the Microsoft Tech Companion to fairly rudimentary man-in-the-middle attacks, has been tracked and logged by the CERT team for only about a week now. But instead of waiting the standard 45-days to silently communicate the problem to the affected companies in order to give them a chance to get out in front of the issue with appropriate patches.
Read moreIt is known that satoshin@gmx.com is the address, which belongs to the world famous inventor of Bitcoin cryptocurrency. Almost all accounts at forums were attached to this E-mail, but recently strange letters were sent from this address and became suspicious.
Last night the strange letter was sent to the administrator of the Bitcointalk.org forum. In line the sender was genuine address satoshin@gmx .com, but obviously there was not Satoshi's handwriting in the text. The letter contained the following message: "Michael, send some coins to me, until I hired the sniper ". Nakamoto never joked in such a way. A little bit later somebody left the message for the real Nakamoto at P2P Foundation forum.
Read moreWhen we think and talk about malware and viruses, we often try and secure our computers with antivirus programs. The obvious threat comes from web where we visit a number of websites and online applications; some of them posing a serious threat for our systems.
However, have you ever thought that a USB device can pose as a danger to our systems? No, we are talking about the viruses entering from a USB to our Windows PCs through some files. This new threat is caused by USB firmware. Well, this is the fact which was brought to notice by a researcher duo, Karsten Nohl and Jakob Lell, in 2014’s Black Hat annual conference that took place in Las Vegas.
Read moreAfter determining the most common vulnerabilities, experts decided to test the effectiveness of methods for their detection.
Attacks on the corporate website lead not only to disorganize the work, but they can be the first step for breaking networks of large corporations. According to Positive Technologies, the number of sites with the critical vulnerabilities has been increased significantly. During the test, the aim of which is to determine the level of information security in 2013 and about 500 sites were tested and 61 was studied deeper. Most of the test sites were banking, because the attacks on the field of finance became very common.
Read moreNormal people spend their nights watching movies, reading articles, socializing or (yes, I know it's odd) sleeping. I spend my nights reading RFCs and pentesting various applications/services.
One night I was randomly reading the tel URI scheme RFC as I am fascinated by old relics that are still used today, their flaws and the way people never read the RFC which leads to RTFM pwnage as I call it. As I finished reading the tel RFC I looked at my iPhone and said: Cool, let's try it out!. I instacoded a small html page and loaded it in Safari. As I clicked the click me link I was prompted with a nice dialog asking me if I really want to call 0000.
Read moreApple says that the mass theft of nude celebrity photos that were released over the weekend did not occur because of a breach in any Apple systems, including iCloud.
Apple says, however, that certain celebrities were the subject of targeted hacking attempts that focused on compromising their usernames, passwords, and security questions. Though Apple's statement doesn't make it entirely clear, it sounds as though iCloud may still have been involved in the thefts in some capacity: that is, Apple's customers may have had their iCloud usernames and passwords stolen, giving another party access to their account.
Read moreThe US National Security Agency (NSA) shares vast amounts of communications data with the country’s government agencies using a search engine similar to Google.
NSA’s search tool, called ICREACH, makes “more than 850 billion records about phone calls, emails, cellphone locations and internet chats” available to nearly two dozen US government agencies, including the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), The Intercept reported on Tuesday citing classified documents leaked by NSA whistleblower Edward Snowden.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland