Blog Posts Tagged with "Denial of Service"

6f11dfa37d387cd7c2099ebcd00bccdd

Meet a Cyber Special Ops Warrior: th3j35t3r

June 05, 2012 Added by:Laura Walker

Although the Jester is often described as a cyber vigilante, his operations tend to steer shy of retributive justice and drive more toward disruption of enemy operations. His targets are researched, specific, and his mission is consistent. There is also the psychological component to PWNing the enemy...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Emerson DeltaV Multiple Vulnerabilities

May 31, 2012 Added by:Infosec Island Admin

Researchers have identified multiple vulnerabilities in the Emerson DeltaV application which can be can be exploited by a remote attacker and could allow denial of service, information disclosure, or remote code execution. Emerson has produced a hotfix that mitigates these vulnerabilities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dominican Republic Central Electoral Board DDoS Attacks

May 30, 2012 Added by:Headlines

“Politically motivated DDoS attacks are increasingly common and are often timed to coincide with high profile events such as elections or executed in response to specific government actions. The key to minimizing disruption is being proactive and putting DDoS protection in place ahead of time...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Warns Companies of Anonymous DDoS Attacks

May 25, 2012 Added by:Headlines

The Cyber Division of the FBI warned several large corporations of the potential for DDoS and data exfiltration attacks scheduled for today, May 25. The attacks are being coordinated by the rogue movement Anonymous in an an exercise termed "Operation NewSon"...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: xArrow Multiple Vulnerabilities

May 25, 2012 Added by:Infosec Island Admin

Security researcher Luigi Auriemma identified and released four security vulnerabilities, along with proof-of-concept code, in the xArrow software application which may cause a denial-of-service condition or allow an attacker to execute arbitrary code...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Is Lord Sugar a Member of Anonymous?

May 18, 2012 Added by:Javvad Malik

I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Wonderware Unicode String Vulnerability

May 17, 2012 Added by:Infosec Island Admin

ICS-CERT is aware of a public report identifying an unallocated Unicode string vulnerability with proof-of-concept exploit code that affects the Invensys Wonderware SuiteLink service which could allow an attacker to remotely crash older versions of the service...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Progea Movicon Memory Corruption Vulnerability

May 11, 2012 Added by:Infosec Island Admin

Security researcher Dillon Beresford of IXIA has identified a memory corruption vulnerability in the Progea Movicon application. This vulnerability can be exploited by a remote attacker to read an invalid memory address resulting in a denial of service...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Releases OS X and Safari Security Updates

May 11, 2012 Added by:Headlines

Apple has released critical security updates for OS X and Safari to address several vulnerabilities which could allow an attacker to obtain sensitive information, execute arbitrary code, escalate privileges, conduct a cross-site scripting attack, or cause a denial-of-service...

Comments  (0)

812d096e189ecbac061ebfe343f91e1e

Driving a Web Application Firewall Toward Better Security

May 10, 2012 Added by:Andrew Sanicola

Web app firewalls can be a useful ally toward greater security for those who know how to use them properly. Whether you’re in the market for a new firewall or are already an owner, understanding it is a tool designed to be driven is an important step toward increased security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Pirate Bay Labels DDoS Attacks as Censorship

May 09, 2012 Added by:Headlines

Critics of DDoS attacks conducted by movements like Anonymous have long held that it is hypocritical to profess the defense of free speech by engaging in a tactic that undermines one's right to freely communicate, whether the interest is sociopolitical or an effort to engage in commerce...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Google as a Cyber Weapon: New Attack Method Discovered

April 30, 2012 Added by:Pierluigi Paganini

The lesson learned is that it is possible to use Google as a cyber weapon to lauch a powerful "Denial of Money" attack against other platforms. In reality, the service in this case hasn't been interrupted, but the attack has made it extremely expensive to run...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Krypt3ia's Rebuttal to th3j35t3r: Oh Jokey…

April 24, 2012 Added by:Infosec Island Admin

I fundamentally disagree with Jester’s method and his goals, as much as they have been explained of breaking their communications. I pretty much explained myself in rather clear, albeit terse, language on several occasions including my rant about getting off the lawn...

Comments  (1)

4777ea0d573c51027a097399006f228a

Th3J35t3r on Krypt3ia - AKA Scot Terban

April 24, 2012 Added by:ʞɔopuooq ʇuıɐs

I would like to state that although everything above is factually true, I am in no way inferring that Mr Terban is in any way supportive of Jihad, quite the opposite. I have been ignoring his rants for a long time and felt that now was a good time to address him...

Comments  (11)

7fef78c47060974e0b8392e305f0daf0

Patriot Hackers: GET OFF MY LAWN!

April 18, 2012 Added by:Infosec Island Admin

Do something constructive instead of destructive and inhibiting. You never know what you are stumbling about in. You could be ruining operations that lead to arrests or actionable intelligence. Think about it before you go all Charles Bronson and then a Pastebin dump about it...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »