USB Worms

Wednesday, January 7th, 2009

USB worms work by creating a file called AUTORUN.INF on the root of USB drives. These INF files then use Autorun or Autoplay to execute themselves either when the stick is inserted, or more commonly, when the user double-clicks on the USB drive icon from My Computer. Such malicious AUTORUN.INF ...

VirusTotal Uploader

Wednesday, January 7th, 2009

VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. Specs: Free, independent service Use of multiple antivirus engines Real-time automatic updates of virus signatures Detailed results from each antivirus engine Real time global statistics You can also email your file ...

Weak Password Brings ‘Happiness’ to Twitter Hacker

Tuesday, January 6th, 2009

An 18-year-old hacker with a history of celebrity pranks has admitted to Monday's hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama's, and the official feed for Fox News. The hacker, who goes by the handle GMZ, told Threat Level on Tuesday he gained entry to Twitter's administrative control panel ...

Cain & Abel v4.9.26 released

Tuesday, January 6th, 2009

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...

New Phishing Kits Hit the Market: Trojan HTML Injections Now for Sale

Tuesday, January 6th, 2009

The economic lifecycle of the underground fraud community functions very similarly to the world of legitimate business. Online fraudsters have supply chains, third-party outsourcers, vendors, and online forums where people with skills and people with opportunities to commit fraud can find each other. The underground fraud supply chain is becoming ...