Wednesday, November 13th, 2013
Back in July 2013, we had discovered a new method of spreading the infamous FBI ransomware by using JavaScript code and iframes to create an illusion that the victim’s browser was locked.
After several months, the threat is still very much alive hopping from one domain name to the next. The message is still ...
Posted in Internet, Security | No Comments
Wednesday, November 13th, 2013
In May of this year, sophisticated attackers breached a large Internet hosting provider and gained access to internal administrative systems. The attackers appear to have been after customer record information such as usernames, emails, and passwords. While these internal administrative systems had access to customer records, discovery of the attack ...
Posted in Internet, Linux, Security | No Comments
Wednesday, November 13th, 2013
At information security conference PacSec 2013 in Tokyo, two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP.
Japanese squad Team MBSD, of Mitsui Bussan Secure Directions, Inc., collected $40,000 for installing malware and collecting personal data on the Android-powered Samsung Galaxy S4. The group ...
Posted in Coding, Hardware, Internet, Mobile, Security | No Comments
Wednesday, November 13th, 2013
Cracked.com, a humor website that is among the 300 most popular sites in the U.S., may have left visitors a sobering surprise this week.
According to Barracuda Labs, as of Sunday the website was compromised to host the Nuclear Pack exploit kit.
Daniel Peck, principal research scientist on the security team at Barracuda Labs, ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, November 13th, 2013
Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of SSL and code signing after January 1, 2016. Using the SHA-1 hashing algorithm in digital ...
Posted in Coding, Internet, Security, Windows | No Comments