Yahoo logins hacked and leaked

Thursday, July 12th, 2012

A hacker group called D33D is claiming to have accessed more than 453,000 logins from Yahoo. The group says it used a union-based SQL injection to access an unidientified Yahoo service to retrieve the data, which it says was unencrypted, and has posted it online. "We hope that ...

Malware-as-a-service allows victim management

Friday, June 22nd, 2012

A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, ...

Unpatched Microsoft security vulnerability being actively exploited

Tuesday, June 19th, 2012

An unpatched critical security vulnerability in Microsoft's software, which means that users' computers can become infected simply by visiting a website with Internet Explorer, is being actively exploited by cybercriminals. Alongside last week's regular Patch Tuesday announcement (including a remote code execution vulnerability that is being exploited by attackers ...

Flame code linked to Stuxnet virus, experts say

Thursday, June 14th, 2012

The Flame cyber-attack that targeted computers across the Middle East has been linked to the Stuxnet worm, which is believed to have been orchestrated by the US and Israel to attack Iranian nuclear centres. Speaking at the Reuters Global Media and Technology Summit on 11 June, Eugene Kaspersky, chief executive of ...

Simple authentication bypass for MySQL root revealed

Wednesday, June 13th, 2012

Exploits for a recently revealed MySQL authentication bypass flaw are now in the wild, partly because the flaw is remarkably simple to exploit in order to gain root access to the database. The only mitigating factor appears to be that it depends on the C library that the MySQL database ...