Blog Posts Tagged with "Sniffing"

68b48711426f3b082ab24e5746a66b36

Free Wi-Fi - Friend or Foe? An Infographic

May 25, 2012 Added by:Fergal Glynn

Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of public Wi-Fi practically everywhere comes at the cost of greater risk to users...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Campaign Targeting Activists Escalates with New Surveillance Malware

April 08, 2012 Added by:Electronic Frontier Foundation

The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Top Forty Banks Targeted by the SpyEye Trojan

March 21, 2012 Added by:Headlines

Researchers from F-Secure released a list of the top forty banks targeted by SpyEye, one of the more powerful data-sniffing Trojans ever developed. The release of the SpyEye source code last year meant a dramatic increase in its application became a very real scenario...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

Assessment of Visual Voicemail Security

March 19, 2012 Added by:Enno Rey

After activation of the VVM feature, the configuration file is stored containing the username, protocol, state of the account and the server IP. Having the username and server IP an attacker can run brute force attacks against the email server which is exposed to the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Gains Self-Propagating Ability via Ramnit

August 26, 2011 Added by:Headlines

“Unlike the past, when financial institutions had to defend against a limited number of malware platforms, attacks can now come from virtually any malicious software program - old or new. The malware distribution channel for fraudsters has increased in scale significantly..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Spreading via Facebook Friend Requests

August 24, 2011 Added by:Headlines

The malware is spreading by sending messages through Facebook notifications. When a user clicks the link to approve a "friend" request it opens a page that invites him to install the what is purported to be the latest version of Adobe Flash Player, but actually installs the malware...

Comments  (0)

3ebd200287a032cf6d13d6b75a570c94

Quiet Please - H4xing in Progress

August 10, 2011 Added by:David Martinez

I used this script from the BT5 How-To page, which grabs packets, redirects them through sslstrip, prints the info to my machine, and sends it to the end-user with a spoofed source. Within 30 minutes, I had at least 5 different passwords for FB, Twitter, G-mail, and others...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Charges Pending Against Google in WiFi Sniffing Case

January 14, 2011 Added by:Headlines

"While we have repeatedly acknowledged that the collection of payload data was a mistake, we are disappointed with this announcement as we believe Google Inc. and its employee did nothing illegal in Korea," Google Korea spokesman Ross LaJeunesses said...

Comments  (0)

76814d6a11ad20c1c48be0e9dce501a7

A Firesheep Overview

January 11, 2011 Added by:Antonio Ierano

What exactly will FireSheep do? FireSheep collects data from cookies. In very simple terms, you can very quickly and easily access the most popular social networking websites using someone else’s credentials – you can basically take over complete access to their account...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Google Street View Illegally Harvests WiFi Data - Again

January 06, 2011 Added by:Headlines

An official with the National Police Agency said that decrypted hard drives seized from Google last year contained private emails and text messages harvested by their Street View survey vehicles. South Korean police said they plan to file criminal charges...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Browser Flaw Allows Website History Sniffing

December 06, 2010 Added by:Headlines

Researchers have discovered a vulnerability that allows harvesting of the browser histories for Firefox and Internet Explorer users. The flaw lets websites that contain some simple code to see what websites visitors have been to, and enables detailed profiling of users web habits...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines Part 1 - Sniffing

November 17, 2010 Added by:Bozidar Spirovski

If one virtual machine starts a sniffer - putting the adapter in a promiscuous mode - it is possible to sniff traffic from the other virtual machines and collect all sorts of interesting information. The attack is a second phase attack after the first virtual machine has been compromised...

Comments  (2)