-
November 29, 2013
Neverquest trojan targets online banking
Neverquest trojan targets online banking: SECURITY FIRM Kaspersky has revealed details about a serious threat to online banking. The Trojan known as Neverquest is said by its creators to be capable of breaking into “any bank in any country”. It has already managed to bypass standard security precautions put in place by banks including safeguards […]
-
November 29, 2013
5 Cloud Computing Myths Busted
5 Cloud Computing Myths Busted: Cloud Computing is not secure There is a lot of hype surrounding this myth, particularly in the wake of spying revelations earlier this year. However, it is important to point out security is at the heart of the vast majority of Cloud solutions; this is why choosing your provider carefully […]
-
November 29, 2013
Inside Israels Quest For Cyberwar Supremacy
Inside Israels Quest For Cyberwar Supremacy: Its the joke of the evening and they tell it again and again, happy with themselves, a lukewarm glass of Coke in their hands: “Are you ready to hear a lie? Because if I tell you the truth, well have to kill you.” They probably wouldnt, but then again […]
-
November 29, 2013
Reverse Meterpreter Connect
Reverse Meterpreter Connect: Recently, I had a discussion with a friend about how neat it would be, if a compromised system could call home through another compromised system. Well, this discussion didn’t need to last long, because this is already possible.
-
November 28, 2013
Million-dollar robbery rocks Bitcoin exchange
Million-dollar robbery rocks Bitcoin exchange: Bitcoin Internet Payment Services, a Denmark-based exchange billing itself as Europe’s biggest, was robbed of bitcoins worth more than $1 million in a theft that took place over the course of the past several days. Bitcoins are a decentralized digital currency generated by computers “mining” for the solutions to complex […]
-
November 28, 2013
Study Suggests Link Between Dread Pirate Roberts and Satoshi Nakamoto
Study Suggests Link Between Dread Pirate Roberts and Satoshi Nakamoto: Two Israeli computer scientists say they may have uncovered a puzzling financial link between Ross William Ulbricht, the recently arrested operator of the Internet black market known as the Silk Road, and the secretive inventor of bitcoin, the anonymous online currency, used to make Silk […]
-
November 28, 2013
Air passengers allowed to refuse body security scans at airports
Air passengers allowed to refuse body security scans at airports: Air passengers can now refuse to go through a security scanner on health grounds or privacy reasons, just as the government introduces such scanners at 11 further airports. But passengers refusing to go through a scanner will have to submit to a private search by […]
-
November 28, 2013
Engineers Plan a Fully Encrypted Internet
Engineers Plan a Fully Encrypted Internet: Responding to reports of mass surveillance, engineers say they’ll make encryption standard in all Web traffic. In response to the public outcry over mass Internet surveillance by the National Security Agency (NSA), the engineers who develop the protocols that underpin the Internet are deep into an effort to encrypt […]
-
November 28, 2013
Facebook Vulnerability Discloses Friends Lists Defined as Private
Facebook Vulnerability Discloses Friends Lists Defined as Private: Irene Abezgauz from the Quotium Seeker Research Center identified a security flaw in Facebook privacy controls. The vulnerability allows attackers to see the friends list of any user on Facebook. This attack is carried out by abusing the ‘People You May Know’ mechanism on Facebook, which is […]
-
November 28, 2013
Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection: Every rootkit employs a wide range of masquerading techniques to prevent its detection. Anti-virus and anti-malware tools must perform what is called, in forensic terms, “live box analysis”, performing a real-time scan of a live system. No wonder rootkits can actively resist detection by either hiding […]