OS & Software

7e364bbac217114a59e547b354e7f7ad

Don’t Be Caught Playing the Fool (A Lesson in Why Change Control is Important)

January 03, 2013 Added by:Gary McCully

This is a real world story around the dangers of not following proper change control processes when placing new systems in production. In this blog I will discuss how one person’s actions could have resulted in an attacker gaining complete access to the organization’s internal network. I am hoping this example will cause organizations to take their change control processes a little more seriou...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Bug Bounty Programs - As a Service?

January 02, 2013 Added by:Rafal Los

Now, admittedly you already probably know I'm not a huge proponent of "bug bounty" programs, as I see the abuses and failure potential outweigh the redemption value in the cases I've seen outside of the few 'big names'... but this caught my attention because they may actually be onto something.

Comments  (0)

296634767383f056e82787fcb3b94864

Would a Malware BuyBack Program Work?

December 27, 2012 Added by:Jeffrey Carr

Most malware writers just want to be paid for their research; something that isn't happening frequently enough or at a rate that's considered fair by the researchers. As a result, some of those researchers are exploring grey markets in offensive malware development or are selling 0-days to clients...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Stuxnet is Back! No, new agencies have misunderstood

December 27, 2012 Added by:Pierluigi Paganini

Everytime news related to Stuxnet is spread on the Internet, immediately the worldwide security community writes on cyber war and the possible consequences of a cyber attacks, but what is really happening this time?

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Obligatory 2013 Infosec Predictions Post

December 26, 2012 Added by:Simon Moffatt

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

Comments  (0)

759c37c6aff04cd46262f93652b5fad5

Analysis of the Microsoft MS12-081 Vulnerability

December 19, 2012 Added by:Spencer McIntyre

This vulnerability would be useful for penetration testers and attackers alike depending on how it could be exploited and any other limiting factors. The following information is the result of a technical analysis of the patch on a Windows XP SP3 system...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran, the cyber shooting range, new malware detected

December 19, 2012 Added by:Pierluigi Paganini

Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...

Comments  (4)

Af9c34417f8e5e0d240850bb353b5d40

Security is Inconvenient, Deal With It!

December 17, 2012 Added by:Keith Mendoza

ZD Net had an article entitled "Kernel vulnerability places Samsung devices at risk" and I thought "so, what's new" until I followed the link to the forum post on xda-developers. Then I just lost it because I'm certain that this is a result of plain and simple laziness...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

How to get into your house through SmartTV

December 14, 2012 Added by:Pierluigi Paganini

Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Common Malware Types: Cybersecurity 101

December 12, 2012 Added by:Fergal Glynn

The amount and variety of malicious programs out there is enough to make your head spin. This blog post will break down the common types of malicious programs and provide a brief description of each...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Skynet, the potential use of Tor as a bulletproof botnet

December 10, 2012 Added by:Pierluigi Paganini

In September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor...

Comments  (0)

296634767383f056e82787fcb3b94864

Flipping Malware: A Profit Opportunity for Corporate IT Departments

December 09, 2012 Added by:Jeffrey Carr

Some of the more forward-looking DOD contractors who have robust internal CERT with engineers who do reverse-engineering could be in the best position to offer free or low-cost network defense to corporations who want to "flip" the malware found on their network for a nice profit...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Sophos Security Threat Report 2013, today... tomorrow

December 07, 2012 Added by:Pierluigi Paganini

Sophos was one of the first security firms that has published a report on the security landscape the upcoming year. The document provides an interesting overview on most common and dangerous cyber threats to determine the level of penetration in different countries...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Japan Aerospace Exploration Agency hit again by malware

December 03, 2012 Added by:Pierluigi Paganini

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer...

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Weaponizing the Nokia N900 – Part 4.0 – A Three Year Anniversary!

November 25, 2012 Added by:Kyle Young

I still believe the best phone for hackers is the Nokia N900 and it is a shame that Nokia decided to go the way of Microsoft. I personally believe that Nokia should have gone the route of an Android/Linux hybrid mobile operating system, but that’s just my opinion...

Comments  (6)

03b2ceb73723f8b53cd533e4fba898ee

W32.Narilam, the malware that hit databases in Middle East

November 25, 2012 Added by:Pierluigi Paganini

W32.Narilam is a worm that attempts to spread by copying itself to all drives and certain shared folders on the compromised computer, the malware doesn’t include modules to steal information from the victims....

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »