Wednesday, April 15th, 2009
Thousands of Web sites have been rigged to deliver a powerful piece of malicious software that many security products may be unprepared to handle.
The malicious software is a new variant of Mebroot, a program known as a "rootkit" for the stealthy way it hides deep in the Windows operating system, ...
Posted in Internet, Privacy, Security, Windows | No Comments
Wednesday, April 15th, 2009
Kernel rootkits are tough enough to detect, but now a researcher has demonstrated an even sneakier method of hacking Linux.
The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware ...
Posted in Coding, Linux, Privacy, Security | No Comments
Wednesday, April 15th, 2009
Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator. The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to the investigator ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, April 1st, 2009
Autohack your targets with least possible interaction.
Features :
- Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits.
- No need to debug, script or compile the source codes.
- Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to ...
Posted in Coding, Internet, Linux, Networking, Perl, PHP, Privacy, Security, Software, Windows | No Comments
Tuesday, March 24th, 2009
Researchers at DroneBL have spotted signs of a stealthy router-based botnet worm targeting routers and DSL modems.
The worm, called “psyb0t,” has been circulating since at least January this year, infecting vulnerable embedded Linux devices such as the Netcomm NB5 ADSL modem (above) and launching denial-of-service attacks on some Web sites.
Some ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments