Saturday, July 3, 2010

IIS Hacked, index. & default. files replaced.

The reason you find every file type in every directory is obvious, the not so obvious is why they don’t include index.aspx & default.aspx on their list of files. Most of these hacker groups or “script kiddies” as their called seem to be Turkish or at least refer to Turkish Hackers in some way within the index files themselves.
Continue. . .

Logica brings on professional hacker.

Logica Australia, a leading IT and business services provider, today announced it has appointed professional hacker, Jody Melbourne, as a Senior Security Consultant.
Continue. . .

‘Hack the Lab’ workshop from Network Defence.

Leading IT and data security specialists Network Defence has hosted a ‘Hack the Lab’ workshop to show businesses how to protect their network and data against hackers, avoid damaging data leaks and safeguard systems against malicious content.
Continue

A noted hacker’s view of Microsoft security.

Hopefully, this post will give you some more “ammo” to use to help your clients understand the implications of staying of XP as it starts to go into end of life.
Continue. . .

Restore your PC to like-new performance.

Does your PC have the same blazing speed and smooth performance as when you first took it out of the box? Chances are, it doesn't. But don't blame your computer. There are hundreds of "bugs" lurking out there, waiting to leave a trail of debris and clutter in your PC.
Continue. . .

Trojans and you.

AVAST Software, developer of the award-winning avast! antivirus, released a report today proving wrong the general "feeling" that it is the 'dodgy' and 'adult‘ sites that are virus infected.
Continue. . .

Protect the Internet, How?

In many ways, a "cyber arms race" of sorts is already afoot. No nation on the planet was more impressed with the information capabilities displayed by the United States in its 1991 war with Iraq than China.
Continue. . .

Malware and defence contractors

Researchers at Symantec Hosted Services said that the operation involved compromising the site of one firm and then using the hacked site to host a malware attack on another contractor.
Continue. . .

The Hacker Spirit.

The word hacker has circled back to a certain degree and I think it's once again a badge of honor and wizardry, not maliciousness. The negative term is still in the majority usage. But there are a pretty substantial number of people who use it in its original sense.
Continue. . .

Superhighway To Hell.

Google and Bing, social networks like Facebook, computer software developers like Microsoft, and e-commerce sites like Amazon and eBay now monitor and store information about users' search activity and use this data to create profiles about who the searchers are (identity), where they are (location), what they want (preferences), how much money they have (financial status), and what they are likely to do or buy next (predictive analysis).
Continue. . .

Undersea cable set to boost West Africa broadband.

The 7,000 km (4,350 mile) fiber optic Main One Cable runs from Portugal to Nigeria and Ghana, and also branches out to Morocco, the Canary Islands, Senegal and Ivory Coast.
Continue. . .

A Letter to Obama.

Senate leadership sent a letter to President Obama Thursday asking for his help in passing comprehensive cybersecurity legislation, though there was no specific mention of the bills currently moving through Congress.
Continue. . .

New Tool Reveals Internet Passwords.

A Russian software company today released a password cracking tool that instantly reveals cached passwords to Web sites in Microsoft Internet Explorer, mailbox and identity passwords in all versions of Microsoft Outlook Express, Outlook, Windows Mail and Windows Live Mail.
Continue. . .

Linux commands.



This July 4, pledge to become cyber secure.

The cyber threats we as Americans face today are complicated and complex. The geographic borders that once served to protect us do not exist in the digital world.
Continue. . .

It's not just the Russians who are spying on the U.S.

Russia is not alone in trying to crack U.S. secrets. China is engaged in a massive espionage effort against the United States that exceeds Russian efforts on a crucial front: Cyber espionage.
Continue

Wireless Security” is an Oxymoron.

WiFi wasn’t born to be secure. It was born to be convenient. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks.
Continue here

Friday, July 2, 2010

The Top 4 WordPress Hacker Alert Plugins.

WordPress is a great platform for blogging and CMS, but it does contain vulnerabilities. A WordPress hacker alert plugin can stop attempts to hack past your security at the source, and notify you of unauthorized attempts to get into your WordPress install. Stop a hacker in their tracks!
Continue. . .

Mercury Solutions Ltd Partners with EC Council.

Mercury, a leading provider of quality training & certification to IT students from world across, enriches its course catalogue by becoming an Accredited Training Partner of EC Council.
Continue. . .

Monday, June 28, 2010

Hacking Via Blender? Household Items Could Become Cyber Victims.

Firewalls and security protection have become a necessity to guard against cyber hackers, but everyday items could be the next to fall victim.

Carnegie Mellon University engineer Ed Schlesinger told Channel 4 Action News that Wi-Fi and Bluetooth connections have essentially turned vehicles into computers on wheels.
Continue. . .

Cracking IP-PBX SIP Passwords.

Originally posted on VoIP & Gadgets Blog, here: http://blog.tmcnet.com/blog/tom-keating/asterisk/cracking-ip-pbx-sip-passwords---be-afraid.asp.
A few years ago I had an email conversation with Chris Lyman, the former CEO of Fonality, the makers of trixbox IP-PBX systems. I expressed concern that their trixbox Pro system was using the MAC address both for the password and the username, which for obvious reasons isn't very secure.

Below is the email conversation slightly edited for security and clarification reasons, followed by some further thoughts on SIP security:
Continue. . .

Fighting back against web attacks.

Hi-tech criminals are not very good at securing the tools they use to attack websites, suggests research.

Security experts have found that many of the kits used by cyber criminals are riddled with bugs and vulnerabilities.

Exploiting the bugs might mean that the attack tools can be turned against those using them.

The bugs found by the researchers could be used to identify who is using the tools and even launch a counter-attack.
Continue. . .

FBI Investigating Possible DSHS Hacker.

Health and Human Services Commissioner Tom Suehs says state health officials notified his office in early May that a hacker was holding the Texas Cancer Registry hostage and demanding a ransom. Suehs says preliminary investigation results from the FBI indicate the threat may be a hoax, and officials with the Department of State Health Services, which oversees the cancer registry, say they don’t believe the names, dates of birth, Social Security numbers and personal medical information contained in it were stolen. But if the FBI determines private records were revealed, Suehs says, health officials will quickly notify the people listed in the registry.
Continue. . .

Sunday, June 27, 2010

Hackers: Friends or foes?

What motivates hackers? Are they upright citizens with a Spiderman-style zeal to protect the world's great companies from their own weaknesses?
Continue. . .

Is “Free Public WiFi” a secure connection ?

Have you ever noticed when trying to connect your Laptop on a wireless network service, sometimes it shows a network “Free Public WiFi” along with your own available wireless service or several others service provider in your neighborhood.
Continue. . .

Federal Informant Allegedly Strong-Armed Hacker Into Caper.

Four years after pleading guilty to an abortive scheme to steal customer credit card numbers from the Lowe’s hardware chain, hacker Brian Salcedo learned from prison last week that a co-conspirator who pressured him to go through with the hack attack was working for the feds at the time.
Continue. . .

Obama Twitter hacker found guilty.

PARIS — A court in central France has convicted a young Frenchman accused of infiltrating Twitter and peeping at the account of President Obama, and given him a five-month suspended prison sentence.
Continue. . .