-
October 1, 2013
VPN provider ‘Proxy.sh’ sniffed the traffic of US based server to Catch Hackers
VPN provider ‘Proxy.sh’ sniffed the traffic of US based server to Catch Hackers: The very first question we always try to figure before choosing a trusted VPN service – Can’t a VPN provider just look at my traffic all they want and see what I’m doing? Well, a reputated VPN provider today answers the Question and […]
-
October 1, 2013
NSA stores metadata of millions of web users for up to a year, secret files show
NSA stores metadata of millions of web users for up to a year, secret files show: The National Security Agency is storing the online metadata of millions of internet users for up to a year, regardless of whether or not they are persons of interest to the agency, top secret documents reveal. Metadata provides a […]
-
October 1, 2013
How Secure Can Silent Circle Get?
How Secure Can Silent Circle Get?: The secure communications provider Silent Circle is pretty upset about the apparent betrayal of the cryptographic community by the National Security Agency, so it’s moving away from encryption standards that the intelligence agency helped develop. Silent Circle, co-founded by Pretty Good Privacy (PGP) author Phil Zimmermann, provides encrypted mobile […]
-
October 1, 2013
US news agency GlobalPost’s twitter and website hacked by Syrian Electronic Army
US news agency GlobalPost’s twitter and website hacked by Syrian Electronic Army: In a series of high profile hacks, ‘Syrian Electronic Army (SEA)’ just a few minutes before took control twitter account and website of ‘GlobalPost’, a US based news agency. ‘Syrian Electronic Army is an organized hacking group loyal to the Syrian President Bashar al-Assad and known for their […]
-
October 1, 2013
Ministry of Defence to recruit cyber territorial army
Ministry of Defence to recruit cyber territorial army: The Ministry of Defence has announced plans to create the cyber equivalent of the territorial army – a team of reservists whose role will be to help defend UK PLC against a cyber attack. The gameplan calls for the MoD to recruit hundreds of people to act […]
-
September 30, 2013
Research detects dangerous malware hiding in peripherals
Research detects dangerous malware hiding in peripherals: A Berlin researcher has demonstrated the capability to detect previously undetectable stealthy malware that resides in graphics and network cards.Patrick Stewins proof of concept demonstrated that a detector could be built to find the sophisticated malware that ran on dedicated devices and attacked direct memory access DMA. The […]
-
September 28, 2013
Metasploit module for the addJavascriptInterface
Joshua J. Drake: Hey all! I’ve managed to develop a Metasploit module that exploits the addJavascriptInterface issue! I’ve successfully demonstrated the attack by performing a MITM attack against Fruit Ninja! Remember, MITM is possible through a plethora of means (as +mike kershaw metioned in his recent post), such as DNS hijacking/spoofing/poisioning, ARP spoofing, WiFi injection, backbone trickery, […]
-
September 27, 2013
SecureBank India Hacked and Defaced Twice in 24 Hours
SecureBank India Hacked and Defaced Twice in 24 Hours: The official website of SecureBank India (securebank.in) has been hacked. A hacker that uses the online moniker “synd1c4te” has taken credit for the attack. According to Pinoy Hack News, the hacker is from the Philippines. Filipino hacktivists have been quite active lately. However, they don’t often […]
-
September 27, 2013
Anti-phishing vital in Scada protection, says expert
Anti-phishing vital in Scada protection, says expert: A high proportion of cyber attacks are enabled by an extremely customised and plausible phishing attacks, says Rohyt Belani, CEO of phishing awareness training firm PhishMe. According to security firm Mandiant, 99% of the security breaches it investigated in 2012 started with a targeted spear-phishing attack. Research has […]
-
September 14, 2013
Kaspersky Lab Uncovers New Cyber Hit
Kaspersky Lab Uncovers New Cyber Hit: Multinational cybersecurity firm Kaspersky Lab said Thursday that it’s discovered a group of “cyber-mercenaries” called “Icefog”. Target: government and military institutions. Most of the victims have been in South Korea and Japan. But the Icefog campaign is coming to an American company near you, Kaspersky Lab security analysts said […]