Blog Posts Tagged with "Spoofing"

D8853ae281be8cfdfa18ab73608e8c3f

Old School On-Target NBNS Spoofing

September 30, 2012 Added by:Rob Fuller

So it turns out that Windows Firewall talks IP addresses just like any other firewall, so if you configure FakeNetBIOSNS to tell everyone that the IP address for whatever they looked up is YOUR IP, guess what, no need to bypass the spoof filters...

Comments  (7)

03b2ceb73723f8b53cd533e4fba898ee

Drones Vulnerable to Hijacking, Raising Concerns for Security

July 02, 2012 Added by:Pierluigi Paganini

The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Alert: Fake FBI Emails Seek Personal Information

June 26, 2012 Added by:Headlines

The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Phishing with PDF's and Why it Works

May 02, 2012 Added by:f8lerror

During many penetration tests the need to social engineer a target may be required. Let’s talk about something that completely relies on the user being conned into following the attackers instructions. The scenario is simple send the user a PDF form and have them submit the form...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Using a Website’s Contact Us Form to Create a Phishing Attack

April 19, 2012 Added by:f8lerror

We all have come across websites that have the forms that say “contact us” or something similar. What’s the big deal? These forms have been around forever, right? When an employee finally gets the message, they are automatically put at ease, and become trusting of the content...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EU: Possession of Hacking Tools to Become a Criminal Offense

April 04, 2012 Added by:Headlines

Cyber attacks on IT systems would become a criminal offense punishable by at least two years in prison throughout the EU under a draft law backed by the Civil Liberties Committee. Possessing or distributing hacking software and tools would also be an offense...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Protect Yourself from Vishing Scams

March 30, 2012 Added by:Robert Siciliano

Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed LinkedIn Messages Serving BlackHole Exploit

March 19, 2012 Added by:Headlines

"Be advised that there are fake Linkedin invitation reminders in circulation sending users to a BlackHole exploit which attempts to drop Cridex onto the PC. Cridex is a rather nasty piece of work that does everything from target banks and social networking accounts..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Phishing Campaign Using Spoofed US-CERT Emails

January 11, 2012 Added by:Headlines

US-CERT has received reports of a phishing email campaign that uses spoofed US-CERT email addresses. This campaign appears to be targeting a large number of private sector organizations as well as federal, state, and local governments...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Nothing Funny About CallerIDFaker

December 29, 2011 Added by:Theresa Payton

Companies are coming up with new technologies to not only spoof your number but to also disguise your voice. This could be scary in the wrong hands. One product, CallerIdFaker, asks you to tape the call as it happens and then share it on their website. Are you laughing yet?

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

The RQ170 Affair: Spoofing, Jamming, and The GBAS

December 18, 2011 Added by:Infosec Island Admin

The documents show a program to “augment” the GPS environment in Iran by placing base stations with the Fajr GPS (GBAS) network/hardware in specific sites throughout the country to ostensibly help with aircraft navigation. In their presentation, they mention the possibility of spoofing...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Attribution Problems Hinder U.S. Cyberwar Strategy

June 07, 2011 Added by:Headlines

"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

How Secure is Your Voice Mail?

April 06, 2011 Added by:Wayde York

I was playing with an application to spoof incoming caller ids on my Android-based phone and was attempting to fool my nephew with a crank call. Turns out, when I called his phone with his own number as the spoofed caller id, it went straight into his voice mail controls...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Google Adds Authentication to Google Apps

February 04, 2011 Added by:Bill Gerneglia

By implementing DomainKeys Identified Mail (DKIM) at no additional cost to Google Apps users, the company says it is giving email senders a way to validate who they are in a manner that spam filters recognize, therefore ensuring higher message delivery rates to recipients...

Comments  (0)