background preloader

The first stop for security news

April 25, 2014 , 2:48 pm Vulnerability in Viber Allows Intercept of Images, Videos A vulnerability exists in Viber, a messaging and VoIP application similar to WhatsApp, that could allow attackers to intercept sensitive information shared between users like images, videos and location information. Read more... April 25, 2014 , 1:30 pm Exploiting Facebook Notes to Launch DDoS

https://threatpost.com/

Related:  cyberWardancolq

Malware Traffic Could Forewarn of International Conflicts A study of malware operating on corporate and government networks suggests that the communication patterns of these programs could warn of major conflicts. Researchers at the security company FireEye monitored millions of malware messages sent over the past 18 months, and they found spikes in the traffic to and from Russia and Ukraine as tensions rose between the two countries earlier this year. A similar pattern was seen in malware traffic to Israel as it entered its recent hostilities with Hamas. The FireEye study drew on data collected from more than 5,000 corporate and government clients around the world. FireEye’s software captures “callback” messages sent by malware inside a network—either reporting its status to its operators or picking up new commands. Those messages were used to determine the location of the computer controlling the malware.

Writing Modular Node.js Projects for Express and Beyond I have worked with Express for over four years now and I cannot count how many different ways I have reorganized my code! Express bills itself as an un-opinionated framework. This is true. How To Change Linkwithin Widget's Text and Style - The Link Medic - Free Blogging Resources If your using Blogger you no doubt use Linkwithin Related Posts Widget for showing similar posts with a thumbnail. It’s incredibly easy to install and it actually works just as advertised one of the best Blogger Widgets out there hands down. I recommend you start using it to decrease your bounce-rate immediatly. I was browsing one of my posts after I published it to ensure everything looked good and noticed how my Linkwithin “You might also like:” text looked rather boring and didn’t match my sites style.

How the Tumblr worm spread so quickly Although Tumblr is now cleaning-up pages which were affected by today's worm, SophosLabs was able to briefly explore how the infection spread. It appears that the worm took advantage of Tumblr's reblogging feature, meaning that anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages. Each affected post had some malicious code embedded inside them: The Base 64 string was actually encoded JavaScript, hidden inside an iFrame that was invisible to the naked eye, that dragged content from a url.

Bitdefender Cybersecurity Blog: News, Views and Insights Website down! DDoS-for-hire site Webstresser shut by crime agencies by Graham CLULEY, from HotForSecurity , on 25.04.2018 International law enforcement agencies have forced offline a website believed to be the worldand#8217;s biggest marketplace for hiring distributed denial-of-service (DDoS) attacks. Webstresser.org offered anyone the ability to purchase a DDoS attack, capable of making websites and services inaccessible to internet users, for less than $20. Cyberspace2025: Today's Decisions, Tomorrow's Terrain Cyberspace 2025: Today's Decisions, Tomorrow's Terrain Navigating the Future of Cybersecurity Policy F or the past 10 years, the world—particularly in developed economies—has witnessed unprecedented growth and innovation in information and communications technology (ICT). But in the coming years it will be the emerging economies of the world that will witness extraordinary growth. By 2025, there will be upwards of 4.7 Billion people online of which 75 percent will come from emerging economies. Research grounded in an econometric model—the Cyber 2025 Model—forecasts that the next decade will witness expansive technological growth, significant demographic shifts, and increasing education needs.

51 Best jQuery Plugins jQuery is a popular javascript framework. The reason it’s so popular because it is very easy to extend with plugins. There is a vast and active community which continuously build plugins to suite different needs, however it is not that easy to keep track of them in your must have lists. This is why, in this post you’ll find 51 best jQuery plugins which you can implement in your project. 1. jQuery-Kit NVD - Detail Cross-site scripting (XSS) vulnerability in the EWWW Image Optimizer plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the error parameter in the ewww-image-optimizer.php page to wp-admin/options-general.php, which is not properly handled in a pngout error message. Impact CVSS Severity (version 2.0):

Submit Suspicious Files We use cookies to save your preferences. To safeguard our commercial interests, we require necessary information about your use of our web pages and the geolocation of the device from where they are accessed. We use Google Analytics to identify this data. Cyber Attack Against Georgia Blurred Civilian And Military Last year's cyber assault against Georgia represents a template for civilian involvement in military action. The cyber attacks against Georgia last year marked the first known time that computer networks were assaulted by civilians in conjunction with physical attacks conducted by a national military force. A report on the events of August 2008 by the U.S. Cyber Consequences Unit, a non-profit research institute, suggests that future conflicts may follow a similar course, raising difficult questions about who represents the enemy in cyberspace and what countermeasures might be appropriate against civilian combatants. An overview of the report states that the cyber attacks against targets in Georgia were carried out by civilians with little or no involvement of the Russian military. But the organizers of the cyber attacks had advance notice of the Russian plans and were told when military operations had commenced so they could coordinate digital bombardment with physical bombardment.

Color Scales · gka/chroma.js Wiki Wiki ▸ Color Scales Chroma.js comes with support for color scales which aims to simplify the mapping of data values to colors. It supports: color interpolation in different color spacesdifferent classification systems (e.g. quantiles) highly customizable multi-color gradients Simple usage Only 100 cybercrime brains worldwide says Europol boss 10 October 2014Last updated at 07:30 ET Troels Oerting (right) believes that there are a limited number of skilled malware producers There are only "around 100" cybercriminal kingpins behind global cybercrime, according to the head of Europol's Cybercrime Centre.

Natural Language Parsing with Retext Retext (GitHub: wooorm / retext, License: MIT, npm: retext) by Titus Wormer is an extensible module for analysing and manipulating natural language text. It’s built on two other modules by the same author. One is TextOM, which provides an object system for manipulating text, and the other is ParseLatin. Largest Cyber-Attack in History Hits Pro-Hong Kong Protest Websites Websites supporting the pro-democracy protesters in Hong Kong have been hit with a series of DDoS attacks which have been described as the largest in history.(Bobby Yip/Reuters) A series of cyber attacks against websites supporting Occupy Central protestors in Hong Kong have been described as the biggest cyber attacks ever recorded.

Related:  Computer Security