Thursday, July 12th, 2012
A hacker group called D33D is claiming to have accessed more than 453,000 logins from Yahoo. The group says it used a union-based SQL injection to access an unidientified Yahoo service to retrieve the data, which it says was unencrypted, and has posted it online. "We hope that ...
Posted in Internet, Privacy, Security | No Comments
Friday, June 22nd, 2012
A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, ...
Posted in Internet, Security | No Comments
Tuesday, June 19th, 2012
An unpatched critical security vulnerability in Microsoft's software, which means that users' computers can become infected simply by visiting a website with Internet Explorer, is being actively exploited by cybercriminals. Alongside last week's regular Patch Tuesday announcement (including a remote code execution vulnerability that is being exploited by attackers ...
Posted in Internet, Security, Software, Windows | No Comments
Thursday, June 14th, 2012
The Flame cyber-attack that targeted computers across the Middle East has been linked to the Stuxnet worm, which is believed to have been orchestrated by the US and Israel to attack Iranian nuclear centres.
Speaking at the Reuters Global Media and Technology Summit on 11 June, Eugene Kaspersky, chief executive of ...
Posted in Internet, Security | No Comments
Wednesday, June 13th, 2012
Exploits for a recently revealed MySQL authentication bypass flaw are now in the wild, partly because the flaw is remarkably simple to exploit in order to gain root access to the database. The only mitigating factor appears to be that it depends on the C library that the MySQL database ...
Posted in Internet, Linux, Security | No Comments