background preloader

Dark, Dank & Dangerous

Facebook Twitter

Zendesk Security Breach Affects Twitter, Tumblr and Pinterest. Photo: Ariel Zambelich/Wired Customer service software provider Zendesk announced a security breach that allowed attackers into its system, where they could access data from three customers this week.

Zendesk Security Breach Affects Twitter, Tumblr and Pinterest

Wired learned those three clients were Twitter, Pinterest and Tumblr. The San Francisco-based company announced the breach in a blog post published early Thursday night. Tumblr notified affected users in an email at approximately 6:35 p.m. PST; Twitter and Pinterest are expected to do so shortly. We’ve become aware that a hacker accessed our system this week. Zendesk allows companies to outsource many of their customer service functions to it via software tools.

Zendesk noted that a hacker downloaded e-mail addresses of users who contacted those three customers for support, along with the e-mail subject lines. The e-mail sent by Tumblr states: Cyber Intelligence Sharing and Protection Act. The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress)) is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The stated aim of the bill is to help the U.S. government investigate cyber threats and ensure the security of networks against cyberattacks.[1] Some critics saw CISPA as a second attempt at strengthening digital piracy laws after the Stop Online Piracy Act and the Protect Intellectual Property Act both met huge opposition.[12] Intellectual property theft was initially listed in the bill as a possible cause for sharing Web traffic information with the government, though it was removed in subsequent drafts.[13] Content[edit] CISPA is an amendment to the National Security Act of 1947, which does not currently contain provisions pertaining to cybercrime.

Recent developments[edit] House voting counts[edit] Software that tracks people on social media created by defence firm. A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social networking websites.

Software that tracks people on social media created by defence firm

A video obtained by the Guardian reveals how an "extreme-scale analytics" system created by Raytheon, the world's fifth largest defence contractor, can gather vast amounts of information about people from websites including Facebook, Twitter and Foursquare. Cryptography I. Download Pidgin for Windows.

Ubuntu ships Pidgin but does not update it after a release (except for security issues and high-severity bugs).

Download Pidgin for Windows

For those users who desire new releases of Pidgin, we have packaged Pidgin in a PPA. If you encounter problems with these packages, try building from source and report the bug. How a social engineer tricked Wal-Mart into handing over sensitive information. Wal-Mart pretty much sliced itself open and spilled its guts onto the scammer's lap.

How a social engineer tricked Wal-Mart into handing over sensitive information

In this year's Capture the Flag social engineering contest at Defcon, champion Shane MacDougall used good lying, a lucrative (albeit bogus) government contract, and his talent for self-effacing small talk to squeeze the following information out of Wal-Mart: The small-town Canadian Wal-Mart store's janitorial contractor,Its cafeteria food-services provider,Its employee pay cycle,Its staff shift schedules,The time managers take their breaks, Where they usually go for lunch, Type of PC used by the manager, Make and version numbers of the computer's operating system, and Its Web browser and antivirus software.

Reporting from the Las Vegas show, which wrapped up a few weeks ago, Stacy Cowley at CNNMoney wrote up the details of how Wal-Mart got taken in to the extent of coughing up so much scam-worthy treasure. But first, he told the store manager, he needed a thorough picture of how the store operated. New Memory Method Lets Users Remember Long Passwords. 'Implicit learning' lets users store a 30-character password in their memories -- without remembering it.

New Memory Method Lets Users Remember Long Passwords

Scrambls - home. Magic Quadrant for Endpoint Protection Platforms. Attackers Divert Bank Phone Calls to Cover Tracks. Poisoning The Data Well. FIDO Alliance technology will allow enterprises to replace passwords with plug-and-play multifactor authentication.

Poisoning The Data Well

By Phil Dunkelberger President & CEO, Nok Nok Labs, 3/26/2014 1 Comment | Read | Post a Comment News Hackers interrupt and deface sites of black-market forums selling credit card data stolen from Target and other retailers.By Mathew J. Schwartz , 3/18/2014. Encrypt Stick Features & Benefits. Sucuri - Protect Your Interwebs. Protect The Business - Enable Access. Danger Room. Wardriving Evolves Into Warflying. News. Opinion. Advice. Research.

Over a million web sites affected in mass SQL injection attack. Security researchers from Armorize have intercepted a mass SQL injection attack, targeting ASP ASP.NET websites.

Over a million web sites affected in mass SQL injection attack

The mass infection, redirects users to a web malware exploitation kit, attempting to exploit vulnerabilities in Adobe PDF or Adobe Flash or Java, with the dropped malware having a low detection rate. Mass SQL injection attacks usually take place through active search engines reconnaissance (SQL Injection Through Search Engines Reconnaissance; Massive SQL Injections Through Search Engine's Reconnaissance - Part Two; Massive SQL Injection Attacks - the Chinese Way) followed by automatic exploitation of the vulnerable sites.

Of the two SQL injected domains and, only is currently active and responding.