Blog Posts Tagged with "Spoofing"
September 30, 2012 Added by:Rob Fuller
So it turns out that Windows Firewall talks IP addresses just like any other firewall, so if you configure FakeNetBIOSNS to tell everyone that the IP address for whatever they looked up is YOUR IP, guess what, no need to bypass the spoof filters...
July 02, 2012 Added by:Pierluigi Paganini
The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...
June 26, 2012 Added by:Headlines
The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...
May 02, 2012 Added by:f8lerror
During many penetration tests the need to social engineer a target may be required. Let’s talk about something that completely relies on the user being conned into following the attackers instructions. The scenario is simple send the user a PDF form and have them submit the form...
April 19, 2012 Added by:f8lerror
We all have come across websites that have the forms that say “contact us” or something similar. What’s the big deal? These forms have been around forever, right? When an employee finally gets the message, they are automatically put at ease, and become trusting of the content...
April 04, 2012 Added by:Headlines
Cyber attacks on IT systems would become a criminal offense punishable by at least two years in prison throughout the EU under a draft law backed by the Civil Liberties Committee. Possessing or distributing hacking software and tools would also be an offense...
April 04, 2012 Added by:Headlines
In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...
March 30, 2012 Added by:Robert Siciliano
Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...
March 19, 2012 Added by:Headlines
"Be advised that there are fake Linkedin invitation reminders in circulation sending users to a BlackHole exploit which attempts to drop Cridex onto the PC. Cridex is a rather nasty piece of work that does everything from target banks and social networking accounts..."
January 31, 2012 Added by:David Navetta
Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...
January 11, 2012 Added by:Headlines
US-CERT has received reports of a phishing email campaign that uses spoofed US-CERT email addresses. This campaign appears to be targeting a large number of private sector organizations as well as federal, state, and local governments...
December 29, 2011 Added by:Theresa Payton
Companies are coming up with new technologies to not only spoof your number but to also disguise your voice. This could be scary in the wrong hands. One product, CallerIdFaker, asks you to tape the call as it happens and then share it on their website. Are you laughing yet?
December 18, 2011 Added by:Scot Terban
The documents show a program to “augment” the GPS environment in Iran by placing base stations with the Fajr GPS (GBAS) network/hardware in specific sites throughout the country to ostensibly help with aircraft navigation. In their presentation, they mention the possibility of spoofing...
June 07, 2011 Added by:Headlines
"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."
April 06, 2011 Added by:Wayde York
I was playing with an application to spoof incoming caller ids on my Android-based phone and was attempting to fool my nephew with a crank call. Turns out, when I called his phone with his own number as the spoofed caller id, it went straight into his voice mail controls...
February 04, 2011 Added by:Bill Gerneglia
By implementing DomainKeys Identified Mail (DKIM) at no additional cost to Google Apps users, the company says it is giving email senders a way to validate who they are in a manner that spam filters recognize, therefore ensuring higher message delivery rates to recipients...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013