Forum latest

Computer Security
Botnet traffic bounds back 90% within 48 hours of ISP shutdown
Security
Written by Daniel   
Wednesday, 26 August 2009 11:16

An Internet service provider was shut down in the hopes that it would quell the traffic of one of the most active botnets, Cutwail. While it was initially effective, Cutwail rebounded almost fully only a few days later.

By Casey Johnston | Last updated August 25, 2009 7:03 PM CT

A common way of combating spam traffic is to shut down the service provider through which the traffic is being processed. With a new variety of botnets, though, this method is becoming increasingly ineffective. The August report from Message Labs indicates that the shutdown of a Latvian ISP, while initially effective, ultimately did little to quell the malicious activity of one botnet, whose traffic recovered in a matter of days.

Read more...
 
Newly Discovered Vulnerability Could Threaten Cisco Wireless LANs
Security
Written by Daniel   
Tuesday, 25 August 2009 11:15
Flaw in Cisco Over-The-Air-Provisioning could allow attackers to gain control of wireless access points, AirMagnet researchers say

Aug 24, 2009 | 06:05 PM
By Tim Wilson
DarkReading

A flaw in the provisioning system used by Cisco wireless LANs could allow attackers to collect data about users' wired networks or even gain access to WLAN-attached systems, researchers said today.

Researchers at AirMagnet's Intrusion Research Team say they have uncovered a security vulnerability in Cisco's Over-The-Air-Provisioning (OTAP), a feature that helps users deploy wireless access points (APs). The potential exploit -- which AirMagnet has dubbed SkyJack -- makes it possible for others to gain control of a Cisco AP, intentionally or unintentionally.  [Comments...]
 
Botmaster: It's All About Infecting, Selling Big Batches of Bots
Security
Written by Daniel   
Friday, 21 August 2009 12:15
Undercover Cisco researcher told the going rate for a single bot is 10- to 25 cents

Aug 20, 2009 | 04:13 PM
By Kelly Jackson Higgins


Researchers at Cisco recently got a rare glimpse of the inner workings of the botnet underworld after going undercover and meeting an actual botmaster online: the botmaster, who ran a botnet that had infected dozens of machines at a Cisco customer site, said his main job is to compromise a few thousand machines and then sell them off in bulk.

Read more...
 
Mega-Breaches Employed Familiar, Preventable Attacks
Security
Written by Daniel   
Wednesday, 19 August 2009 11:41

Alleged mastermind behind Heartland, Hannaford's, and 7-11 breaches used SQL injection, sniffers, custom malware in attacks

Aug 18, 2009 | 04:17 PM
By Kelly Jackson Higgins
DarkReading

The attacks that led to the mass theft of over 130 million credit and debit card accounts may hold the record for the biggest overall breach ever charged in the U.S., but the attackers used classic and well-known methods that could have been thwarted, according to experts.

In the wake of the big news yesterday that one man is suspected to be behind the biggest breaches ever charged in U.S. history, security experts say the indictment of 28-year-old Albert Gonzalez, aka "segvec," "soupnazi," and "j4guar17," of Miami, Fla., revealed that Gonzalez and his cohorts exploited vulnerabilities that are typically found in many cybercrime cases --SQL injection, packet sniffing, and backdoor malware designed to evade detection. [Comments...]
 
U.S. DOJ Approves of RIAA's $1.92M USD Fine Against Citizen
Security
Written by Daniel   
Tuesday, 18 August 2009 11:29

 The government gives the RIAA the green light to sue its citizens out of house and home -- if they fileshare

Jason Mick (Blog) - August 18, 2009 7:55 AM

 Many balked at the gargantuan fine leveled upon Jammie Thomas-Rassert.  Beaten by the music industry copyright protection organization, the RIAA, a jury of her peers handed the working woman an incredible fine of $1.92M USD; one that she likely will not be able to pay off during her working career.  Her financial future has essentially been ruined due to two key decisions -- first deciding to download and share the tracks, and second, standing up to the RIAA, rather than settling.[ DailyTech...]   [Comments...]

 
U.S. Court Rules Consumers Never Have the Right to Copy DVD Movies
Security
Written by Daniel   
Friday, 14 August 2009 11:38
Making one copy is stealing one copy, says MPAA

Jason Mick (Blog) - August 13, 2009 1:04 PM

This week a landmark verdict was handed down to RealNetworks with deep implications for fair use and personal property in America.  The ruling wasn't about filesharing, piracy, or malicious computer use.  Rather, it was fight over whether users should be able to make copies of digital content that they legal own.  And in a precedent-setting decision, the media companies beat a small software vendor and fair use advocates and laid down an imposing decision -- copying DVDs that you own is illegal.  [DailyTech...]   [Comments...]
 
E-Voting Machine Hack Steals Votes
Security
Written by Daniel   
Thursday, 13 August 2009 11:42
  University researchers fool an e-voting machine into swapping votes from one candidate to another

Aug 12, 2009 | 04:27 PM
By Kelly Jackson Higgins
DarkReading

Electronic voting machine security suffered another blow as researchers this week showed how they were able to hack a machine and steal votes.

A team of computer scientists from University of California-San Diego, the University of Michigan, and Princeton University used an attack based on "return-oriented programming" to turn a Sequoia AVC Advantage e-voting machine against itself and shift votes from one candidate to another.
[Comments...]
 
Security researchers zero in on Twitter hackers
Security
Written by Daniel   
Monday, 10 August 2009 11:28

Confirm DDoS attacks targeted pro-Georgian blogger in massive effort to keep him quiet

By Gregg Keizer
August 7, 2009 04:05 PM ET

Computerworld - Security experts are making progress in their efforts to identify the hackers responsible for the distributed denial-of-service (DDoS) attacks that crippled Twitter for several hours yesterday.

They have also come up with strong evidence that confirms claims the DDoS rampage that brought down Twitter and hit Facebook, Google's YouTube and LiveJournal, were caused by attacks targeting a pro-Georgian activist and blogger.
Read more...
 
Weaponizing Apple's iPod Touch
Security
Written by Daniel   
Friday, 07 August 2009 11:30

Security expert converts popular music/movie player and browsing device into a penetration testing, hacking tool

Aug 05, 2009 | 03:02 PM
By Kelly Jackson Higgins
DarkReading

It fits behind a coffee machine, inside a desk drawer, or in your pocket, and it doesn't arouse suspicion if you walk into a bank or office tapping away on it -- and that's why a security expert has turned an iPod Touch into a full-blown hacking tool.

Thomas Wilhelm, associate professor of information system security at Colorado Technical University, showed attendees at last week's Defcon17 conference in Las Vegas how Apple's seemingly benign iPod Touch can be converted into a portable and stealthy penetration testing or attack tool. He outfitted the iPhone cousin with the popular Metasploit software for exploiting vulnerabilities, as well as password-cracking and Web app hacking applications he was able to easily download onto the device.  [Comments...]

 
Twitter Downed By Cyber-Thugs?
Security
Written by Daniel   
Thursday, 06 August 2009 11:35
Twitter has been down most of this morning all over the world because, it says, of a denial of service (DOS) attack. Is it payback for Twitter's attempts at fighting malware?

Posted by Michael Hickins, Aug 6, 2009 11:38 AM

Indeed, given the magnitude of the attack, it wouldn't be at all surprising if this turned out to be payback by cyber-thugs for Twitter's recent moves to thwart malware and links to malicious sites.

And this is bigger than just Twitter. The outage is also affecting users who have their Twitter accounts linked to Facebook, preventing them from updating their pages, and affects companies that use Facebook to interact with customers.      [Information Week...]   [Comments...]
 
<< Start < Prev 11 12 13 14 15 16 17 18 19 20 Next > End >>

Page 20 of 28

See also

None found.


Hardware | Windows | Linux | Security | Mobile Devices | Gaming
Tech Business | Editorial | General News | folding@home

Forum | Download Files

Copyright ©2001 - 2012, AOA Forums.  All rights reserved.

Alliance of Overclocking Arts

Links monetized by VigLink

Don't Click Here Don't Click Here Either