background preloader

Information about Viruses, Hackers and Spam

Information about Viruses, Hackers and Spam

https://securelist.com/

A Practical Guide to Implementing SEC Guidance on Disclosure of Cybersecurity Risks and Cyber Incidents Recent, high-profile cyber attacks and cybersecurity lapses have resulted in a serious focus on cybersecurity from the Obama administration, the Senate and the SEC. In the past year, there were reports of cyber thieves hacking corporate networks to steal customer data from financial services firms and retailers, intellectual property from life sciences, technology and industrial companies and information regarding the location of major oil reserve from multinational oil companies. This proliferation of cyber attacks led to five U.S. senators writing to SEC Chairwoman Mary Schapiro asking the SEC to develop and publish interpretive guidance on the disclosure of cybersecurity risks by public companies. The SEC’s Division of Corporation Finance staff did so in October 2011 (www.sec.gov/divisions/corpfin/guidance/cfguidancetopic2. htm).

Blog Archive » Stuffing Javascript into DNS names Greetings! Today seemed like a fun day to write about a really cool vector for cross-site scripting I found. In my testing, this attack is pretty specific and, in some ways, useless, but I strongly suspect that, with resources I don't have access to, this can trigger stored cross-site scripting in some pretty nasty places. But I'll get to that! Interestingly enough, between the time that I wrote this blog/tool and published it, nCircle researchers have said almost the same thing (paper (pdf)). The major difference is, I released a tool to do it and demonstrate actual examples.

Bitdefender Cybersecurity Blog: News, Views and Insights Website down! DDoS-for-hire site Webstresser shut by crime agencies by Graham CLULEY, from HotForSecurity , on 25.04.2018 International law enforcement agencies have forced offline a website believed to be the worldand#8217;s biggest marketplace for hiring distributed denial-of-service (DDoS) attacks. Dirty USSDs and the Android Update Problem Last week, it was reported that some Android devices could be wiped remotely if the user unwittingly clicked on a link. Since then, Samsung has announced that for the Galaxy S III the issue was already fixed in the last update and urged customers to update their devices accordingly. While the speed of Samsung’s response was commendable, what was left unsaid highlights the complicated environment of Android updates – and why it hurts the security of ordinary users. Simply put, it is very difficult to push updates for Android devices. Three parties are involved: Google, the phone manufacturer, and the carrier.

Submit Suspicious Files We use cookies to save your preferences. To safeguard our commercial interests, we require necessary information about your use of our web pages and the geolocation of the device from where they are accessed. We use Google Analytics to identify this data. As part of this, we have configured Google Analytics to minimize the amount of data that is collected and to ensure compliance with legal requirements.By agreeing to all the categories, you help us: Understand your needs Improve our services Deliver personalized ads and contentSave your preferencesAnalyze visitor interactions Click below to Agree to all cookies or choose to manage the more advanced settings.

Analysis of Flame WuSetupV.exe URL parameters » CrySyS Blog Basically the main functionality of the WuSetupV.exe of Flame is to create a special URL, download the main component of Flame using the special URL, store it and install it on the victim computer. The most interesting topic is what type of data is stored inside the URL created by WuSetupV as it uses multiple parameters, likeGET /view.php?mp=1&jz=4073875454&fd=28369876&am=55597C801D14&ef=40474645&pr=0&ec=0&ov=666641736666417766664174pl=gspnZGygMcK0Gnng|spnZGy|nynn|0ncnn|TWvDKoKv|nGcRW0Gn|Dnann|Rya0ZjD8|nR0jKnZ|nR0jKnZ|nR0jKnZ|nR0jKnZ|nR0jKnZ|n8KKDnR|GU8DKcGc|-2TacGCcap|RyZKKDne|RyZKKDne|aDo|Tn0vZLp|Txax0DZ|qxsGZx8-4GUg|cGoGeWZ|qxsGZx8-| HTTP/1.1 So let’s see how the parts of the URL are created. The “jz=” parameter is created randomly, but reused if error occurs and second download is done.

Ponemon statistics 2012 on cost of cybercrime At the American Enterprise Institute (AEI) event “Cybersecurity and American power,” Gen. K.B. Alexander, director of the National Security Agency (NSA) and chief at the Central Security Service (CSS), defined cybercrime “the greatest transfer of wealth in history.” alerting Government on the emergency related to intellectual property theft due cyber espionage. The Good, The Bad and the Insecure This article is not written by me. I found it online, but only in one place so this is effectively a mirror for it. Enjoy /////////////////////////////////////////////////////////////////////////////// /************************************************** ***************************/ /* Tutorial: How to write a backdoor for OpenSSH. */ /* Date: June 29, 2005 */ /* Author: pikah (rvdwesten@gmail.com) */ /* Website: */ /* */ /* DISCLAIMER: */ /* This tutorial is published here for one reason only: To make the problem */ /* understandable for users who are interested in the way a sshd-daemon */ /* can be easily backdoored.

How to Check for Flame By Jacob Kitchel The biggest cyber security related news story this week has been about the Flame/Wiper malware. The event has gotten high profile coverage by several media outlets. So far, there have been no strong indicators the Flame virus is tied to anything ICS or SCADA related. There has been plenty of speculation in the media coverage that Flame does target ICS environments based on its apparent sophistication and the countries in which infected machines were detected.

Chetan Surpur Sidestep is an open-source application for Mac OS X that sits quietly in the background, protecting your security and privacy as you browse the web. Say Hello to Sidestep The problem When you connect to the Internet through an unprotected wireless network, such as at a coffeeshop or an airport, where you don’t have to enter a security key, you’re putting yourself at risk. Attackers connected to the same network can easily intercept your unencrypted traffic and log in as you to services such as Facebook, Amazon, and LinkedIn. Try this simple Firefox add-on to see for yourself how serious the problem is and how easy it is for your privacy and security to be compromised.

Blog » Blog Archive » Pcprox RFID Reader – New Tool for reading RFID/HID Card PcproxRFIDReader is the FREE tool for reading RFID/HID card ID using pcProx USB readers. PcProx is popular range of HID (RFID) card readers – from RFIdeas Inc - typically used by administrators to configure and enroll new (HID based) access cards. These access cards are commonly used as identification and tracking mechanism for employees in most organizations around the world.

Related: