If someone was attempting to break into YOUR site, use YOUR bandwidth, or even use YOUR site to launch attacks against OTHER sites, would you know? How would you know? When would you know?
Continue. . . .
Related articles by Zemanta
Tuesday, July 27, 2010
Red Lambda raises $10M for network security software.
The company said it is also launching the latest version of its AppIron Grid Platform this week.
Continue. . .
Continue. . .
Related articles by Zemanta
Sourcefire Founder and CTO, Martin Roesch.
Snort(R) and a leader in intelligent cybersecurity solutions, today announced its founder and CTO, Martin Roesch, will wrap-up its successful Sourcefire(R) Seminar Series in Washington, D.C. and Jersey City, New Jersey. In these sessions, Mr. Roesch will highlight the issues that IT environments face from advanced persistent threats.
Related articles by Zemanta
- Sourcefire Delivers 20 Gbps Intrusion Prevention Solution (eon.businesswire.com)
- Who will trust open source security from the government (zdnet.com)
Labels:
ceo,
cio,
hack,
Intrusion prevention system,
Open source,
security,
Snort,
Technology
Millions of Home Routers Will Soon Be Hacked.
Apparently the tool uses a variation on a technique known as "DNS rebinding." It takes advantage of an age-old problem with the DNS system where websites balance traffic by offloading visitors to additional IP addresses. "There have been plenty of patches over the years, but this still hasn't really been fixed," said Craig Heffner, the researcher behind the hacking tool.
Related articles by Zemanta
- Flaw could expose 'millions' of home routers (go.theregister.com)
- Researcher will enable hackers to take over millions of home routers (engadget.com)
Labels:
DNS,
Forensics and Incident Response,
hack,
internet,
IP address,
phishing,
security,
Technology
Solera Networks raises $15M for real-time network security.
Solera Networks has raised $15 million in a third round of funding for its real-time network forensics and monitoring business. It’s another sign that the security technology industry is going through a revival.
Related articles by Zemanta
- Solera Networks CEO to Speak at 2010 Montgomery Technology Conference (eon.businesswire.com)
- FireEye and Solera Networks Partner to Provide In-Depth Security Analytics for Proactive Cyber Attack Mitigation (eon.businesswire.com)
Labels:
Consultants,
cyber,
Forensics and Incident Response,
hack,
internet,
malware,
pc,
phishing,
security,
Technology
Saturday, July 24, 2010
Finally -- a hacking conference just for kids!
A new conference will teach kids the true skills of the (legal) hacker: curiosity, experimentation, tech fluency, and fun.
Continue. . . .
Continue. . . .
Stuxnet malware threat continues, targets control systems.
The malware has been active for several days, targeting supervisory control and data acquisition (SCADA) systems, which are used to manage operations at places such as power plants and gas and oil refineries, to obtain data.
Continue. . . .
Continue. . . .
Could a single hacker crash a country’s network?
You know you’re living in the new millennium when one of the Obama administration’s newest positions is nicknamed the “cyberczar.”
Continue. . . .
Continue. . . .
Don’t get caught with your pants on the ground…like I did!
Some Proactive and Preventative Measures You Can Take to Protect Your Gmail and Google Accounts From Being Hacked!
Continue. . . .
Continue. . . .
Preventing Social Engineering Attacks.
This article will describe many of the common security flaws that information thieves take advantage off and how you can prevent them.
Continue. . . .
Continue. . . .
Big Brother Is Watching, Bigstring Is Watching Your Back.
Self-Destructing Email
Recallable/Erasable Email
Non-Forwardable Email
Non-Printable/Savable Email
Advanced Email Tracking
Continue. . . .
Recallable/Erasable Email
Non-Forwardable Email
Non-Printable/Savable Email
Advanced Email Tracking
Continue. . . .
Friday, July 23, 2010
'Freeware' phishing kit dupes's kiddies.
A "freeware" phishing kit posted onto hacker forums poses as a way to set up fraudulent websites pretending to be, for example, PayPal or webmail providers. Spam emails masquerading as security checks are then distributed to hoodwink the credulous into handing over their login credentials.
Continue. . . . .
Continue. . . . .
Thursday, July 22, 2010
First true SCADA-specific malware detected.
SCADA systems have become a vital component of the nation's critical infrastructure, since so many SCADA functions deal with water, power, and heavy manufacturing processes.
Continue. . .
Continue. . .
Chinese army to target cyber war threat.
New department dedicated to protecting information security follows creation of US cyber command.
Continue. . .
Continue. . .
Is a hack into our nation’s domestic infrastructure possible?
The National Security Agency recently unveiled a program to help secure the networks of crucial domestic infrastructure, including the networks of electrical companies and nuclear power plants.
Continue. . .
Continue. . .
Hacker University Fills Classrooms in Record Numbers.
Parameter Security, an ethical-hacking firm based in St. Louis, Missouri, created H@cker University to help businesses develop offensive cyber security techniques to protect their networks and data banks.
Continue. . .
Continue. . .
Wednesday, July 21, 2010
Researcher will enable hackers to take over millions of home routers.
Cisco and company, you've got approximately seven days before a security researcher rains down exploits on your web-based home router parade. Seismic's Craig Heffner claims he's got a tool that can hack "millions" of gateways.
Continue. . .
Continue. . .
Obama Says He Can't Intervene in British Hacker Case - PCWorld Business Center
President Barack Obama said on Tuesday that he can't intervene in the long-running case of a British hacker charged with breaking into U.S. military computers.
Continue. . .
Continue. . .
PM offers hacker a glimmer of hope.
Gary McKinnon's legal team has welcomed Prime Minister David Cameron's suggestion that the computer hacker could spend any conviction imposed in a British jail.
Continue. . .
Continue. . .
Monday, July 19, 2010
Cyber warfare: Indian Army boosts its defences.
The Indian Army is fighting attacks in the cyber world with electronic warfare capability of the "highest standard", say officials pointing out that virtual strikes have shot up from hostile quarters in both sophistication and frequency.
Continue. . .
Continue. . .
Sunday, July 18, 2010
The Android Mall: 8 Weird but Cool Android Apps#links
The Android Mall: 8 Weird but Cool Android Apps
Friday, July 16, 2010
4 tips to protect you from ATM thieves.
ATMs are under siege more than ever from skimming. Skimming, where ATM thieves steal your PIN and account number using remote devices, is increasing dramatically.
Continue. . .
Continue. . .
Saturday, July 10, 2010
Spyware Blockers.
A hacker is someone who knows how to get into your computer from their own computer.
Continue. . .
Continue. . .
Intrusion Prevention - Palo Alto
This week the Ponemon Institute released a study of almost 600 IT security professionals who overwhelmingly reported an increase in advanced threats and a lack of proper security mechanisms to deal with them.
Continue. . .
Continue. . .
VeriSign Appeal Denied.
The case could potentially end the company’s control of .com and .net domain names.
Continue. . .
Continue. . .
How hackers work.
If you have ever had your computer or an account hacked, you will know how invasive this crime can be.
Continue. . .
Continue. . .
Wednesday, July 7, 2010
Americans Adopt Chinese Web Habits ?
When it comes to revenue on the U.S. Internet, it has traditionally come from three sources:
Continue. . .
Continue. . .
Twitter to Promote Marketers' Special Offers.
Twitter has introduced another advertising service, hoping to generate revenue this time by promoting special offers, events and one-time deals from marketers.
Continue
Continue
Sourcefire Awards Sixth Annual Snort Cybersecurity Scholarships.
Sourcefire, Inc. (FIRE 18.42, -0.06, -0.33%) is a world leader in intelligent Cybersecurity solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks.
Continue
Continue
RiskMetrics Group Recommends SonicWALL.
The recommendations of ISS are relied upon by hundreds of major institutional investment firms, mutual funds and other fiduciaries throughout the country.
Continue
Continue
Hack Brings Verizon To iPad.
In an effort to improve the iPad's mobile data connection one hacker modded an iPad 3G to work with Verizon's network.
Continue. . .
Continue. . .
Your Phone Number Can Be Easily Hacked.
Using “widely available information and existing techniques,” DePetrillo and Bailey reportedly were able to construct detailed files on a cellphone user.
Continue. . .
Continue. . .
Houston hacker gets a year's porridge.
A HACKER who broke into his former employer's network has been jailed for a year.
Continue. . .
Continue. . .
Monday, July 5, 2010
At least four Armenian websites were attacked by Azerbaijani hackers.
At least four Armenian websites were attacked by Azerbaijani hackers during a week.
Continue. . .
Continue. . .
Hacking the Night Away.
The hour approaches midnight on the campus of Carnegie-Mellon University in Pittsburgh, but in Wean Hall, C.M.U.'s computer center, it might as well be high noon.
Continue. . .
Continue. . .
Is Wireless Security a Contradiction in Terms ?
Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful.
Continue. . .
Continue. . .
Steganography. What ?
Steganography disguises the messages as something else, so the interceptor doesn’t even know there’s a message buried in there.
Continue. . .
Continue. . .
3G users vulnerable to hackers.
3G mobile phone users in Viet Nam are vulnerable to attacks by hackers, experts from the Ha Noi-based Bach Khoa Internet Security warn.
Continue. . .
Continue. . .
40,000 hackers in China ?
While the Government of India is keen to deliver a number of services to its people by using information and communication technology (ICT) tools, it is highly worried about prevention of data that it would generate from cyber criminals, especially in China.
Continue. . .
Continue. . .
U.S. largely ruling out N. Korea in 2009 cyberattacks.
U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites, according to cybersecurity experts.
Continue. . .
Continue. . .
Sunday, July 4, 2010
Is your college student carelessly invite identity thieves and predators?
In its annual report earlier this year, the Federal Trade Commission announced that the most vulnerable targets of identity theft are 18-29 years old.
Continue. . .
Continue. . .
Secure Your iTunes Account.
Some desperate iPhone developer(s) has hacked a lot of accounts of the users located all over the world.
Continue. . .
Continue. . .
App Store hacked.
Various blogs are reporting that it appears some iTunes customer accounts have been hacked and that funds from those accounts may have been used to purchase apps in the iTunes App Store.
Continue. . .
Continue. . .
Saturday, July 3, 2010
IIS Hacked, index. & default. files replaced.
The reason you find every file type in every directory is obvious, the not so obvious is why they don’t include index.aspx & default.aspx on their list of files. Most of these hacker groups or “script kiddies” as their called seem to be Turkish or at least refer to Turkish Hackers in some way within the index files themselves.
Continue. . .
Continue. . .
Logica brings on professional hacker.
Logica Australia, a leading IT and business services provider, today announced it has appointed professional hacker, Jody Melbourne, as a Senior Security Consultant.
Continue. . .
Continue. . .
‘Hack the Lab’ workshop from Network Defence.
Leading IT and data security specialists Network Defence has hosted a ‘Hack the Lab’ workshop to show businesses how to protect their network and data against hackers, avoid damaging data leaks and safeguard systems against malicious content.
Continue
Continue
A noted hacker’s view of Microsoft security.
Hopefully, this post will give you some more “ammo” to use to help your clients understand the implications of staying of XP as it starts to go into end of life.
Continue. . .
Continue. . .
Restore your PC to like-new performance.
Does your PC have the same blazing speed and smooth performance as when you first took it out of the box? Chances are, it doesn't. But don't blame your computer. There are hundreds of "bugs" lurking out there, waiting to leave a trail of debris and clutter in your PC.
Continue. . .
Continue. . .
Trojans and you.
AVAST Software, developer of the award-winning avast! antivirus, released a report today proving wrong the general "feeling" that it is the 'dodgy' and 'adult‘ sites that are virus infected.
Continue. . .
Continue. . .
Protect the Internet, How?
In many ways, a "cyber arms race" of sorts is already afoot. No nation on the planet was more impressed with the information capabilities displayed by the United States in its 1991 war with Iraq than China.
Continue. . .
Continue. . .
Malware and defence contractors
Researchers at Symantec Hosted Services said that the operation involved compromising the site of one firm and then using the hacked site to host a malware attack on another contractor.
Continue. . .
Continue. . .
The Hacker Spirit.
The word hacker has circled back to a certain degree and I think it's once again a badge of honor and wizardry, not maliciousness. The negative term is still in the majority usage. But there are a pretty substantial number of people who use it in its original sense.
Continue. . .
Continue. . .
Superhighway To Hell.
Google and Bing, social networks like Facebook, computer software developers like Microsoft, and e-commerce sites like Amazon and eBay now monitor and store information about users' search activity and use this data to create profiles about who the searchers are (identity), where they are (location), what they want (preferences), how much money they have (financial status), and what they are likely to do or buy next (predictive analysis).
Continue. . .
Continue. . .
Undersea cable set to boost West Africa broadband.
The 7,000 km (4,350 mile) fiber optic Main One Cable runs from Portugal to Nigeria and Ghana, and also branches out to Morocco, the Canary Islands, Senegal and Ivory Coast.
Continue. . .
Continue. . .
A Letter to Obama.
Senate leadership sent a letter to President Obama Thursday asking for his help in passing comprehensive cybersecurity legislation, though there was no specific mention of the bills currently moving through Congress.
Continue. . .
Continue. . .
New Tool Reveals Internet Passwords.
A Russian software company today released a password cracking tool that instantly reveals cached passwords to Web sites in Microsoft Internet Explorer, mailbox and identity passwords in all versions of Microsoft Outlook Express, Outlook, Windows Mail and Windows Live Mail.
Continue. . .
Continue. . .
This July 4, pledge to become cyber secure.
The cyber threats we as Americans face today are complicated and complex. The geographic borders that once served to protect us do not exist in the digital world.
Continue. . .
Continue. . .
It's not just the Russians who are spying on the U.S.
Russia is not alone in trying to crack U.S. secrets. China is engaged in a massive espionage effort against the United States that exceeds Russian efforts on a crucial front: Cyber espionage.
Continue
Continue
Wireless Security” is an Oxymoron.
WiFi wasn’t born to be secure. It was born to be convenient. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks.
Continue here
Continue here
Friday, July 2, 2010
The Top 4 WordPress Hacker Alert Plugins.
WordPress is a great platform for blogging and CMS, but it does contain vulnerabilities. A WordPress hacker alert plugin can stop attempts to hack past your security at the source, and notify you of unauthorized attempts to get into your WordPress install. Stop a hacker in their tracks!
Continue. . .
Continue. . .
Mercury Solutions Ltd Partners with EC Council.
Mercury, a leading provider of quality training & certification to IT students from world across, enriches its course catalogue by becoming an Accredited Training Partner of EC Council.
Continue. . .
Continue. . .
Monday, June 28, 2010
Hacking Via Blender? Household Items Could Become Cyber Victims.
Firewalls and security protection have become a necessity to guard against cyber hackers, but everyday items could be the next to fall victim.
Carnegie Mellon University engineer Ed Schlesinger told Channel 4 Action News that Wi-Fi and Bluetooth connections have essentially turned vehicles into computers on wheels.
Continue. . .
Carnegie Mellon University engineer Ed Schlesinger told Channel 4 Action News that Wi-Fi and Bluetooth connections have essentially turned vehicles into computers on wheels.
Continue. . .
Cracking IP-PBX SIP Passwords.
Originally posted on VoIP & Gadgets Blog, here: http://blog.tmcnet.com/blog/tom-keating/asterisk/cracking-ip-pbx-sip-passwords---be-afraid.asp.
A few years ago I had an email conversation with Chris Lyman, the former CEO of Fonality, the makers of trixbox IP-PBX systems. I expressed concern that their trixbox Pro system was using the MAC address both for the password and the username, which for obvious reasons isn't very secure.
Below is the email conversation slightly edited for security and clarification reasons, followed by some further thoughts on SIP security:
Continue. . .
A few years ago I had an email conversation with Chris Lyman, the former CEO of Fonality, the makers of trixbox IP-PBX systems. I expressed concern that their trixbox Pro system was using the MAC address both for the password and the username, which for obvious reasons isn't very secure.
Below is the email conversation slightly edited for security and clarification reasons, followed by some further thoughts on SIP security:
Continue. . .
Fighting back against web attacks.
Hi-tech criminals are not very good at securing the tools they use to attack websites, suggests research.
Security experts have found that many of the kits used by cyber criminals are riddled with bugs and vulnerabilities.
Exploiting the bugs might mean that the attack tools can be turned against those using them.
The bugs found by the researchers could be used to identify who is using the tools and even launch a counter-attack.
Continue. . .
Security experts have found that many of the kits used by cyber criminals are riddled with bugs and vulnerabilities.
Exploiting the bugs might mean that the attack tools can be turned against those using them.
The bugs found by the researchers could be used to identify who is using the tools and even launch a counter-attack.
Continue. . .
FBI Investigating Possible DSHS Hacker.
Health and Human Services Commissioner Tom Suehs says state health officials notified his office in early May that a hacker was holding the Texas Cancer Registry hostage and demanding a ransom. Suehs says preliminary investigation results from the FBI indicate the threat may be a hoax, and officials with the Department of State Health Services, which oversees the cancer registry, say they don’t believe the names, dates of birth, Social Security numbers and personal medical information contained in it were stolen. But if the FBI determines private records were revealed, Suehs says, health officials will quickly notify the people listed in the registry.
Continue. . .
Continue. . .
Sunday, June 27, 2010
Hackers: Friends or foes?
What motivates hackers? Are they upright citizens with a Spiderman-style zeal to protect the world's great companies from their own weaknesses?
Continue. . .
Continue. . .
Is “Free Public WiFi” a secure connection ?
Have you ever noticed when trying to connect your Laptop on a wireless network service, sometimes it shows a network “Free Public WiFi” along with your own available wireless service or several others service provider in your neighborhood.
Continue. . .
Continue. . .
Federal Informant Allegedly Strong-Armed Hacker Into Caper.
Four years after pleading guilty to an abortive scheme to steal customer credit card numbers from the Lowe’s hardware chain, hacker Brian Salcedo learned from prison last week that a co-conspirator who pressured him to go through with the hack attack was working for the feds at the time.
Continue. . .
Continue. . .
Obama Twitter hacker found guilty.
PARIS — A court in central France has convicted a young Frenchman accused of infiltrating Twitter and peeping at the account of President Obama, and given him a five-month suspended prison sentence.
Continue. . .
Continue. . .
Saturday, June 26, 2010
Russia: Analysis of hacker attacks on bloggers.
Over the last five years, more than 40 RuNet bloggers have become targets of hacker attacks, most of which were carried out by a group of hackers named The Brigade of Hell. The hackers' targets have been both political and commercial bloggers. After defacing and deleting content of their victims, hackers have received no punishment.
Continue. . .
Continue. . .
Hacker Accused Of Video Extortion
The FBI says that female victims were spied on with their Web cams and pressured to provide explicit videos.
A 31-year-old resident of Santa Ana, California, was arrested earlier this week on charges that he hacked into computers, stole personal data on the machines and then demanded sexually explicit videos from female victims as a condition for not disseminating other explicit and personal data.
Continue. . .
A 31-year-old resident of Santa Ana, California, was arrested earlier this week on charges that he hacked into computers, stole personal data on the machines and then demanded sexually explicit videos from female victims as a condition for not disseminating other explicit and personal data.
Continue. . .
Apple is the new hacker bulls-eye.
When Apple was just a niche maker of Mac computers and only truly popular among college students and graphic designers, hackers paid little attention to the company. Instead, they focused on Microsoft, which had more than a 90% share of the PC operating system market.
Those days are over.
Continue. . .
Those days are over.
Continue. . .
The Pentagon has unveiled a Cyber Command center
War is coming -- a war of ones and zeroes, that is.The Pentagon has unveiled a Cyber Command center, designed to shield the military's 15,000 networks and more than 7 million computers from foreign hacker attacks, that will pool resources from a variety of military intelligence agencies to proactively prevent assaults.
It's a pre-emptive, all-out attack on the more than 100 foreign intelligence agencies working to penetrate American computer systems and steal U.S. weapons technology.
Continue. . .
Subscribe to:
Comments (Atom)






