attack

Mon
15
Nov
Dennis Faas's picture

New Firefox Plug-in Detects Browser Hijack Attacks

Cloud-based security company "Zscaler" has launched a new Firefox web browser plug-in called "BlackSheep" designed to protect users against a recent browser hijacking tool that allows just about anyone to potentially hijack your web browser session. ... Firesheep: A 'Peculiar' Extension In order to explain the details of how "Blacksheep" came to be, we need to take a few steps back. In October of this year, a Firefox plug-in dubbed "Firesheep" was created. It was an extension put together by developer Eric Butler and demonstrated at the Toorcon security conference. ... (view more)

Fri
05
Nov
Dennis Faas's picture

Hackers Target IE6 and 7; MS Recommends Upgrade

Microsoft has announced a temporary workaround for users of older editions of Internet Explorer (IE) vulnerable to a new bug. The situation yet again highlights the importance of upgrading to the more secure, recent editions (IE8 and IE9) of the ... browser. The bug's dynamics are all-too-familiar: if a hacker persuades a user to visit a specially-crafted webpage, they'll be able to install and run malicious software on the user's computer. It's another zero day attack , meaning the problem is currently being exploited by hackers before Microsoft has a working fix. Browser Check First, Virus ... (view more)

Mon
04
Oct
Dennis Faas's picture

Iran Confirms Nuclear System Hit By Virus

Analysis of a major worm virus that specifically targets industrial control systems shows that three-fifths of the infected machines were in Iran. There's now speculation that the country's nuclear program was the target -- and that a national ... government might have been the culprit. It has been known since July that the Stuxnet virus targeted Iran. Over a three-day period that month, 58.85 per cent of all Stuxnet-infected machines were in the country. (Source: symantec.com ) Infrastructure Under Attack The virus is carefully crafted to breach SCADA (supervisory control and data acquisition) ... (view more)

Fri
01
Oct
Dennis Faas's picture

Hackers Cashing in on Stolen Online Gaming Accounts

Those who spend their time racking up points in online multi-player video games are now being targeted by hackers looking to cash in on their progress. Specially-crafted malware has been made in an effort to attack online gamers, steal their account ... information (and subsequent point accumulation) and sell their goods online. The most popular game currently targeted is World of Warcraft, and maker Blizzard has been working on ways to counter the problem. World of Warcraft attacks have continued to plague Blizzard since reports of difficulties experienced with the game's authenticator were ... (view more)

Fri
11
Jun
Dennis Faas's picture

Widespread Web Attack Infects Thousands of Legitimate Sites

Thousands of legitimate websites have fallen victim to a widespread web attack. While the full extent of the attacks remain unknown, security analysts suspect that the hackers used what is called an "SQL injection attack" in an attempt to fool ... legitimate web sites into running malicious database commands. In short, the attack injects malicious HTML content into a web browser while users are viewing an otherwise legitimate site. If the malware is successfully installed, it opens a gateway which allows hackers to remotely control a PC. (Source: networkworld.com ) Up to 114,000 Sites ... (view more)

Wed
19
May
Dennis Faas's picture

Security Researchers Uncover Do-It-Yourself Twitter Botnet

More and more research is proving that those who know how to create viruses and malware are keen on reaching out to others, most likely to cash in on their deceptive knowledge. Such can be proven with TwitterNet Builder: a new tool designed to ... simplify botnet-based attacks over Twitter. Botnets: A Virtual Army of Zombie Computers For those unaware, a botnet is a technical term used to describe a network of computers under the control of a malicious software program. Once a computer has become compromised, the botnet program runs silently and autonomously until issued a command from a master ... (view more)

Wed
12
May
Dennis Faas's picture

New Malware Attack Renders All Antivirus Useless

A group of security researchers say they've found a workaround for just about every antivirus product on the market today, effectively making Windows-based security programs totally useless. Security research site Matousec.com recently issued an ... advisory for a process that allows malware to evade security detection. Note that this doesn't just apply to Microsoft's free Security Essentials software or other freeware antivirus products, but also targets full software packages from industry leaders like Norton, BitDefender and McAfee. Matousec's Morphing Malware According to reports, Matousec. ... (view more)

Wed
07
Apr
Dennis Faas's picture

PDF Document Exploit Prompts Fears of Worm-Like Malware Attack

Jeremy Conway, a security researcher with NitroSecurity, is claiming to have found a way to spread malicious code via PDF (Portable Document Format) documents. The secret is in the way PDF file format works. More specifically, a certain flaw exists ... in the PDF file format that adds malicious data to legitimate files. This means that anyone who opens compromised PDF files instantly becomes a victim of a worm-like attack. Attack Launched Without User Consent Conway spent a great deal of time developing a technique with which to inject malicious commands into PDFs. Until now, his attacks only ... (view more)

Thu
01
Apr
Dennis Faas's picture

Hackers Use Network Card Firmware to Deliver Payload

Cybercrime is often likened to a never-ending cycle: just when a security company believes they have found a way to combat one malware-installation method, hackers come along and find a new ways to attack a computer. Thus, it should come as little ... surprise that there is a new hack that attacks network card firmware: software specifically designed to control the network card. This innovative hacking technique (dubbed the "Jedi Packet Trick") works by sending infectious network packets to the network's firewall , which needs to be running a vulnerable network card. Once an infected packet is ... (view more)

Wed
20
Jan
Dennis Faas's picture

MS Warns: Internet Explorer Vulnerable; Offers Tips to Stay Safe

Microsoft announced yesterday that it was working on a special emergency patch to prevent the spread of an Internet Explorer zero-day flaw in its Internet Explorer browser that allowed hackers to breach the defenses of Google, Adobe, and about 32 ... other companies. The attack is said to be "the most sophisticated cyber attack... seen in years," according to tech security firm McAfee . Now, Microsoft is offering recommendations for home and business users trying to keep themselves protected until the Internet Explorer patch is widely available. Older Versions of IE, Windows Most ... (view more)

Pages

Subscribe to RSS - attack