Blog Posts Tagged with "Attack"

201d6e4b7cd0350a1a9ef6e856e28341

Demonstration of Destructive Cyberattack Vector on “Air-gapped” Systems

September 30, 2016 Added by:Joe Weiss

Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Denying the Deniers: Tackling DDoS Attacks

February 17, 2016 Added by:Avishai Wool

As DDoS continues to be used as a cyber-weapon against websites and online resources, organizations should ensure that they have a response plan in place that includes these mitigation techniques, to help deny attempted denial-of-service attacks.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Potential Collateral Damage from an Israeli First Strike on Iran

August 26, 2012 Added by:Richard Stiennon

Carbon whiskers unleashed to disable transformers? Oh yes. Just a few grams got released into the atmosphere and shorted out transformers throughout the Pacific Northwest. I do not like the idea of kilograms of this escaping the target area. It could be decades before power grids are free of this menace...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Hacktivists Claim Government and Military Systems Breach

May 03, 2012 Added by:Headlines

A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Google as a Cyber Weapon: New Attack Method Discovered

April 30, 2012 Added by:Pierluigi Paganini

The lesson learned is that it is possible to use Google as a cyber weapon to lauch a powerful "Denial of Money" attack against other platforms. In reality, the service in this case hasn't been interrupted, but the attack has made it extremely expensive to run...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Fake LinkedIn Notifications Serving Up Malware

April 20, 2012 Added by:Headlines

Researchers are reporting bogus LinkedIn notifications that lead users to malware. The spoofed notifications look legitimate, sporting the LinkedIn logo and a format familiar to members of the business networking platform, making the operation difficult to detect...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed LinkedIn Messages Serving BlackHole Exploit

March 19, 2012 Added by:Headlines

"Be advised that there are fake Linkedin invitation reminders in circulation sending users to a BlackHole exploit which attempts to drop Cridex onto the PC. Cridex is a rather nasty piece of work that does everything from target banks and social networking accounts..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Fake YouTube Site Targets Activists with Malware

March 17, 2012 Added by:Electronic Frontier Foundation

The fake YouTube page attacks users in two ways: it requires you to enter your YouTube login credentials in order to leave comments, and it installs malware disguised as an Adobe Flash Player update. To see if you have been infected, look for the following files...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Drive-By Malware Spam Infects Upon Opening Email

February 01, 2012 Added by:Pierluigi Paganini

According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zappos.com Hack: 24 Million Customer Records Breached

January 15, 2012 Added by:Headlines

A source has provided Infosec Island with a copy of a message they received while logging in to their account regarding a "security update". The message advises customers to change their password, but makes no mention of the massive data loss event...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Lilupophilupop SQLi Attack: One Million URLs Infected

January 05, 2012 Added by:Headlines

"When I first came upon the attack there were about 80 pages infected according to Google searches. Today, well as the title suggests we top a million, about 1,070,000 in fact - there will be duplicate URLs that show up in the searches. Still working on a discrete domain list for this..."

Comments  (1)

6648b1abd4a9b964566c3690613f20a6

Following the Trail of Web-Based Malware

December 15, 2011 Added by:Mark Baldwin

The main.php script contained javascript that attempted to exploit several potential vulnerabilities. I downloaded the script and analyzed it. By inserting an “alert” statement into the script prior to the actual execution of the code, we can get a good idea of what the script does...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Affiliate Arrested for 2010 DDoS Attack

December 14, 2011 Added by:Headlines

"According to the indictment, Poe used a favorite software tool of the Anonymous collective—a Low Orbit Ion Cannon, which is a computer program that is used to send extremely large numbers of “packets” or requests over a network in an attempt to overwhelm a target computer..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked