hackers

Fri
11
Feb
Dennis Faas's picture

Hackers offered Big Payout to Poison Web Browsers

Elite hackers and ethical computer security enthusiasts are preparing themselves for the Pwn2Own competition, which challenges participants to break through security of popular software programs (such as web browsers). Once software is breached, it ... is referred to as an "exploit", in which hackers are then able to gain access to other areas of the computer's operating system without restrictions. It's these types of attacks which occur on web sites frequently, where visitors become instantly infected just by visiting a malicious website containing an unknown exploit (also referred to ... (view more)

Mon
03
Jan
Dennis Faas's picture

McAfee Security Releases 2011 Threat Predictions Report

Security company McAfee Labs recently released their 2011 Threat Predictions report, where they foresee cyber criminals turning their attention to three specific attack vectors in the coming year. An attack vector is "a path or means by which a ... hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack vectors enable hackers to exploit system vulnerabilities, including the human element." (Source: techtarget.com ) Most specifically, Google TV, the Apple iPhone, and Foursquare: a location-based social networking ... (view more)

Tue
03
Aug
Dennis Faas's picture

Hackers Birth Automated Phishing Kit that Never Dies

Hackers have now started using what is being referred to as "indestructible" cloud computing -based phishing attacks . In short, a phishing attack is a "criminally fraudulent process of attempting to acquire user names, passwords, and credit card ... details by masquerading as a trustworthy website." (Source: wikipedia.org ) For example, you may have received a dubious email asking you to "update" your banking information or to "change your online banking password." These are typical phishing scams whereby the information you input is stolen by fake ... (view more)

Tue
01
Jun
Dennis Faas's picture

Hackers Out-pay Corporations for Security Flaw Details: Report

A new survey appears to confirm what most would suspect: people who discover security flaws make more money selling the details to criminals than to legitimate security companies. Research firm "Unsecurity" has carried out a survey of people who ... have discovered zero-day vulnerabilities and them sold them to security companies that then use the data to improve their products. Zero-day vulnerabilities occur when the original software manufacturer is unaware of a security risk in a software program. The name comes from the idea that once the manufacturer discovers the problem, there's ... (view more)

Fri
19
Mar
Dennis Faas's picture

Latest Malicious Facebook Email Steals Passwords

If you receive an email with the message "Facebook password reset confirmation customer support" in the subject line, don't click the link. Doing so would cause you to fall victim to the latest password-stealing virus targeting Facebook users. ... Facebook's estimated 400 million users are being targeted by hackers in an effort to steal banking passwords and gather other sensitive information. McAfee Warns of Malware in Attachment According to McAfee Inc., recipients of the email are told that their Facebook passwords have been reset. They're then urged to click on an attachment to obtain new ... (view more)

Tue
16
Feb
Dennis Faas's picture

New Spy Eye 'Toolkit' Kills Trojan, Then Steals Bank Info

A new Trojan horse has surfaced online; its primary functionality makes it appear to be friendly to end users, but the final result can prove disastrous. On one hand, the Spy Eye toolkit is celebrated for its ability to remove malicious rival ... programs from infected computers. It boasts a feature called "Kill Zeus" which removes all traces of the notorious Zeus virus from a victim's PC. Of course, the Trojan horse has ulterior motives in playing the hero. It "Kills" the Zeus Trojan so that the computer is once again susceptible to attack, meaning that Spy Eye has exclusive access to usernames ... (view more)

Thu
28
Jan
Dennis Faas's picture

Experts: New Win7 Security Also Brings New Threats

Security firm Sophos tells PC World that two security measures introduced in Windows Vista and expanded in Windows 7 have had a marked effect on levels of infection on computers. Nevertheless, several online security professionals have reminded ... users of Windows 7 that while the new operating system (OS) offers enhanced security over its predecessors, it's not invulnerable. They note that human vulnerabilities will always leave people at risk to hackers. Two New Security Features Mark Improvements Address Space Layout Randomization (ASLR) partially randomizes the order in which data is stored ... (view more)

Wed
27
Jan
Dennis Faas's picture

Adobe Flaw Leaves Millions of Twitter Users at Risk

Security researchers are warning the Twittering world that their credentials may be vulnerable to hackers. The most disturbing news, however, is that the problem, which exploits Adobe System's Flash programming language, was first discovered almost ... four years ago. Mike Bailey, a senior security analyst with Foreground Security in Orlando, Florida has informed Twitter of the flaw. However, all warnings seem to have fallen on deaf ears. Most website operators have downplayed the severity of the situation, even though it could compromise many users. No Restorative Actions to Date Frustrating ... (view more)

Mon
14
Dec
Dennis Faas's picture

Security Risks to Increase with Real-Time Searches

A range of security experts say the crusade by search engines to include "real-time" results from social networking sites will undoubtedly make life easier for hackers. Such word comes hot on the heels of a report suggesting sites like Facebook and ... Twitter now pose a risk to businesses. As we reported last week, Google is trying out a new feature which lists results for a search term in real time . That means that for popular topics there's no longer a lengthy waiting period while web pages are scanned and indexed: instead they are constantly monitored and appear in a special results section ... (view more)

Tue
10
Nov
Dennis Faas's picture

New PC Virus Delivers Illicit Child Photos as Payload

One of the most malicious computer viruses ever created has been launched against unsuspecting users. Rather than jeopardize the financial well being of an individual, however, this new form of malware looks to ruin reputations by suggesting that ... innocent people are pedophiles. In this twisted practice, hackers are now unloading dozens of prohibited photographs into computers worldwide. Virus Payload Not Random Acts of Chaos The motivation for doing something so sinister is baffling, to say the least. While many would believe that hackers are engaging in this practice for the purpose of ... (view more)

Pages

Subscribe to RSS - hackers