Items Tagged with "Attacks"


69dafe8b58066478aea48f3d0f384820

The SMS of Death Mobile Phone Attack Explained

March 21, 2011 Added by:Headlines

"They use special binary characters and overflowed headers to temporarily crash most older models made by manufacturers including Nokia, Samsung, Sony Ericsson, LG, Motorola, and Micromax. Carrier networks often aggravate the attacks by bombarding the target with the same malicious message..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Japan's Nuclear Crisis, Stuxnet and SCADA Defenses

March 20, 2011 Added by:Anthony M. Freed

Generators and water pumps are examples of rotating machinery that are controlled in industrial systems by PLCs. It is not hard to extrapolate that designer-malware like Stuxnet could target these systems and cause the shut down of a nuclear power plant or the release of a radioactive plume...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoS Surpasses SQL Injections as Primary Attack Method

March 16, 2011 Added by:Headlines

"Many of these organizations foolishly think that the network security gear that they have to handle the lower level DoSing floods will take care of this and it won't. The overall amount of traffic that you have to send to take down the Web server is a lot less, and it looks legitimate..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus and SpyEye Botmasters Attack Security Sites

March 10, 2011 Added by:Headlines

"A series of discussions on an uber-exclusive Russian language forum that caters to identity and credit card thieves reveal that botmasters are becoming impatient in their search for a solution that puts Hüssy and/or his tracking services out of commission once and for all..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Officials Deny Role in Attacks on South Korea

March 10, 2011 Added by:Headlines

"You can never judge the origin of attackers from the computer's IP address. A professional hacker can launch cyber attacks from everywhere and disguise himself to be any country's citizens," an anonymous Chinese hacker told the Global Times...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Websites Remain Vulnerable to Attacks

March 09, 2011 Added by:Headlines

The study looked at the both the presence of a vulnerability and the length of time before remediation. The results showed that the websites were exposed 270 days of the year on average. Education sector websites lead the pack, followed by retail and social networking sites...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

ENISA Releases Comprehensive Study on Botnet Threat

March 08, 2011 Added by:Headlines

"Botnets: 10 Tough Questions” is a policy-level distillation of ENISA’s consultation with top experts from all sides of the fight against botnets, including Internet Service Providers, security researchers, law enforcement, Computer Emergency Response Teams and anti-virus vendors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DDoS Attack Utilizes Self-Destructing Botnet

March 08, 2011 Added by:Headlines

"One thing is clear: This is a serious piece of malware. It uses resilience techniques to avoid a takedown and even has destructive capabilities in its payload. This year is quickly shaping up to be a period of serious attacks and escalations on the cyberfrontier..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WordPress DDoS Attacks Traced to China

March 07, 2011 Added by:Headlines

“Right now there are huge asymmetric risks on the internet because any bad actor, for a few tens of thousands of dollars, has the online equivalent of a dirty nuke and can bring even the largest sites to their knees and silence millions of voices..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attackers Utilize Emerging Technologies

March 01, 2011 Added by:Headlines

"Attackers know the limits of traditional security solutions, but they are also very good at taking advantage of emerging technologies and new vectors for attack. Standalone user applications, social engineering attacks, and the move to HTTPS all have the potential to introduce new threats"...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Cyber Weapon Capable of Crashing the Internet?

February 23, 2011 Added by:Dan Dieterle

In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...

Comments  (2)

6648b1abd4a9b964566c3690613f20a6

Profiling the Use of Javascript in a Driveby Download Attack

February 21, 2011 Added by:Mark Baldwin

The process described in this article is very typical of how hackers use javascript to install malware on unsuspecting users browsing the web. Understanding how the bad guys use web technology to conduct their attacks can help all of us defend our networks against them...

Comments  (0)

0b8d1c9dc5f4a80e6646d8d18b8683fe

Norton Cybercrime Index

February 17, 2011 Added by:Ben Keeley

Norton (Symantec) released a new cybercrime tool, it's pitched as a tool that 'measures and warns people about cybercrime risks around the world'. At first glance the Internet version is a very slick and smooth interface, which displays recent trends for ID theft, malware, spam and fraud...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Energy Companies Hit by Chinese "Night Dragon" Attacks

February 10, 2011 Added by:Headlines

"Targeted attacks such as Night Dragon, orchestrated by a growing group of malicious attackers committed to their targets, are rapidly on the rise. These targets have now moved beyond the defense industrial base, government, and military computers to include global corporate and commercial targets..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

B of A Enlists Security Firms to Undermine WikiLeaks

February 10, 2011 Added by:Anthony M. Freed

The fallout from the HBGary Federal breach continues to spread as leaked documents reveal that BofA was soliciting proposals for strategies to undermine WikiLeaks. The proposed strategies suggested a variety of tactics which ranged from a disinformation campaign to outright cyber attacks...

Comments  (2)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Less Costly, More Common?

February 08, 2011 Added by:Bill Gerneglia

The average cost of cyber attack declined significantly last year, but survey sponsors said the finding might be misleading. A spokesman for the company that paid for the study said that could be due to organizations reclassifying losses as related to privacy and fraud rather than cyber security...

Comments  (0)

Page « < 30 - 31 - 32 - 33 - 34 > »