Blog Posts Tagged with "Source Code"
Update 3: Hackers May Leak Norton Antivirus Source Code
January 05, 2012 Added by:Headlines
YamaTough has posted more information from the alleged breach on Google+ in an effort to prove this is not a spoof, an excerpt is as follows...
Comments (23)
Update: File Appears to Contain 2006 Norton AV Source Code
January 05, 2012 Added by:Anthony M. Freed
Infosec Island has been provided with a file that appears to contain source code for the 2006 version of Norton antivirus. We have provided Symantec with the file and are awaiting their analysis. We will not be releasing the file due to the sensitive nature of the information...
Comments (6)
Want the Source Code to Stuxnet? Come and Get It
October 20, 2011 Added by:Joel Langill
Though this does not reflect true "source code", it does provide high-level language which can be re-compiled for another purpose. I reviewed much of the code, and though it did not contain 100% of the Stuxnet functionality, it did contain a large portion of the working malware...
Comments (0)
Anonymous Unveils Twitter Hijack Tool: URGE
September 09, 2011 Added by:Headlines
Anonymous has released an purported Twitter hijacking tool called URGE, posting the source code for the exploit on Github. Using the tool could be considered an illegal act, and those that choose to download and perform Twitter hijacking operations could find themselves facing legal repercussions...
Comments (0)
SpyEye Trojan Source Code Now in the Wild
August 17, 2011 Added by:Headlines
"Now that SpyEye has been outed, it is only a matter of time before this becomes a much larger malware threat than any we have seen to date. So for the next few months, please hold onto your seats people… this ride is about to get very interesting..."
Comments (0)
Did LulzSec Hack Apple's iCloud and Steal Source Code?
June 24, 2011 Added by:Headlines
An anonymous Pastebin posting from June 21 states that hackers claiming to be part of the LulzSec collective successfully breached Apple's iCloud networks several weeks ago. The posting claims that the intruders mapped the network and "grabbed all their source code and database passwords..."
Comments (1)
Microsoft Gives Source Code to Chinese Government
June 13, 2011 Added by:Danny Lieberman
Having access to Windows source code has made it easier for Chinese cyber attackers to write attack code to penetrate and compromise US defense contractors, critical infrastructure and activist groups like change.org - who all still use highly vulnerable Windows monoculture products...
Comments (2)
Think You Can’t Afford Code/App Testing? Think Again...
May 19, 2011 Added by:Brent Huston
Today, you have a plethora of code review automation tools and source code scanners. These tools make an easy way to pick the low hanging (and sometimes higher) vulnerabilities out of your code long before it is exposed to malicious outsider/insider contact...
Comments (1)
Source Code for Zeus Crimeware Toolkit Disclosed
May 11, 2011 Added by:Headlines
"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."
Comments (0)
Secure Your Chance to Win a Copy of 'The Source Code'
May 08, 2011 Added by:Infosec Island Admin
In an age when people are becoming more reliant on computers for both work and personal use, exposure to cyber-hackers and the risk associated with identify theft is escalating at an alarming rate. William A. Thau’s novel seems to be an eerie foreshadowing of recent events...
Comments (0)
Supporting "Unmaintainable" Applications
May 08, 2011 Added by:Rafal Los
A solid Software Security Assurance program takes into consideration the legacy risks from all the applications that have existed before a security program came into being. The issues that surround legacy applications are complex, and can create headaches for security teams...
Comments (0)
Penetration Testers: Backtrack 5 Release Slated for May
May 04, 2011 Added by:Headlines
BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), will support 32 and 64 bit architectures, and will officially support KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment...
Comments (0)
Source Code is the New Hacker Currency
May 01, 2011 Added by:Rafal Los
The reason we're seeing security companies as a big, bright, shining target recently is that attackers finally realized they were sick of hitting each target individually - and wanted a way to hit millions of high-valued corporate safes all at once, potentially...
Comments (4)
WordPress Hack Exposes Proprietary Source Code
April 14, 2011 Added by:Headlines
"Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed... We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners’ code..."
Comments (0)
McAfee Website Vulnerable to XSS and Other Attacks
March 29, 2011 Added by:Headlines
"The McAfee SECURE trustmark only appears when the website has passed our intensive, daily security scan. In other words, the presence of this label means that the website is not vulnerable to the exact same vulnerabilities McAfee currently has.."
Comments (1)
Using DLP to Protect Your Source Code
January 17, 2011 Added by:Danny Lieberman
This points at a wider problem for software developers everywhere. Whether you collaborate with a partner on development or outsource an entire project, you expose sensitive software and intellectual assets to people people with limited allegiance to your firm...
Comments (1)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider