1,390 Topics

Member Avatar for
Member Avatar for happygeek

According to a press release that arrived today, entitled "Kaspersky Lab identifies first targeted attack utilising malware for Android devices", it marks the "first serious wave of targeted attacks using Android malware" but just how worrying is that really? ![ad9c332c555679ef709b67f0c7093e73](/attachments/large/0/ad9c332c555679ef709b67f0c7093e73.jpg "ad9c332c555679ef709b67f0c7093e73") The PR company sending the release were at pains …

Member Avatar for peter_budo
1
677
Member Avatar for happygeek

Why has it taken six years for someone to take a contract out on my life? Or, more accurately, for a scammer to send me an email demanding payment of a bribe in order for him to cancel a supposed contract. The first hitman scam was spotted almost exactly six …

Member Avatar for <M/>
2
682
Member Avatar for happygeek

A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side …

Member Avatar for LastMitch
3
447
Member Avatar for happygeek

Think of spam and chances are your mind immediately turns to China or Russia and messages about sexual dysfunction or a financial deal you cannot believe. Maybe, though, your thoughts should be closer to home. Especially if home is in the United States. [ATTACH=RIGHT]22797[/ATTACH]According to the latest research from security …

Member Avatar for LastMitch
0
434
Member Avatar for happygeek

At the risk of being somewhat obsessed by hitmen after [one recent news story](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/441025/dont-be-fooled-by-the-fake-hitman-scam) here at DaniWeb, I'm running another. This time though, it's cybercriminals and hackers who would hold your computer and data to ransom that are the target of a contract killer. The killer in question being the …

Member Avatar for LastMitch
3
314
Member Avatar for happygeek

It's never easy calculating the true cost of inadequate security to business, not least as there are so many variables and such reticence when it comes to full disclosure for fear of brand damage. However, the latest [Information Security Breaches Survey](http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml) (ISBS) from PwC/Infosecurity Europe has had a good bash …

Member Avatar for LastMitch
1
484
Member Avatar for happygeek

You might not have heard about Dirt Jumper yet, but the bad guys have. In fact, the high-risk and highly-effective DDoS toolkit is probably the most aggressive of the malware tools being employed by DDoS attackers at the moment, and the situation is set to get much worse very quickly …

Member Avatar for LastMitch
1
510
Member Avatar for happygeek

The latest VIPRE report, detailing the ten most prevalent malware threat detections spotted by [GFI Labs](http://malwareprotectioncenter.com/) and the ThreatNet Detection System, reveals that Google, LinkedIn, Skype and Mass Effect 3 were amongst the big brands being exploited by cybercriminals in order to leverage trust whilst distributing malware-laden emails. As a …

Member Avatar for LastMitch
2
484
Member Avatar for happygeek

China may be odds-on to top the medal table at the London 2012 Olympic Games, with less than a week to go, but according to a new report South Korea has the Chinese well and truly beaten as far as malware infected PCs are concerned. And unlike at the Olympic …

Member Avatar for LastMitch
1
432
Member Avatar for Emily Banks

Lawmakers in Washington asked tech companies Tuesday whether they need to create legislation that would protect people's private information online. The Senate Commerce Committee took up the issue, asking representatives from Apple, AT&T, Facebook and Google if an online privacy bill is necessary. Those companies have all dealt with recent …

Member Avatar for LastMitch
0
516
Member Avatar for CatRambo

[ATTACH=RIGHT]16244[/ATTACH]Ron Bowes has been accused of hacking Facebook. But when he put the information for over a 100 million [URL="http://www.facebook.com"]Facebook[/URL] users into a 2.8 GB torrent stream on his website Skullsecurity.org, he didn't need to hack anything to get it - it was already publicly available on Facebook. All he …

Member Avatar for LastMitch
0
652
Member Avatar for happygeek

New research shows that hackers are becoming increasingly lazy in their search for online exploits, with 98% of Remote File Inclusion and 88% of SQL injection attacks now being fully automated. It comes as no surprise whatsoever to DaniWeb administrators and moderators that your average cybercriminal is looking for the …

Member Avatar for LastMitch
1
541
Member Avatar for happygeek

FireEye security researchers are warning that they have [detected a new zero-day vulnerability](http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html) that is being used successfully in the wild against browser clients with both Java 6u41 and Java 7u15 installed. Given that the Java 7 update was only released a couple of weeks ago, this is yet more …

Member Avatar for jwenting
3
1K
Member Avatar for happygeek

Reports are coming in thick and fast about 'state-sponsored' zero-day exploits hitting business websites in the UK. The latest, disclosed yesterday by [SophosLabs](http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/), involves an as yet unnamed European aeronautical parts supplier and follows on from another the day before involving a European medical company site. In both cases the …

Member Avatar for jwenting
1
525
Member Avatar for happygeek

Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and …

Member Avatar for gyno
3
557
Member Avatar for Techno22

Toshiba Windows 7 Laptop is not accepting 1 Critical Update after numerous attempts. It is update KB2667402 159KB. Any help would be appreciated. System is Windows 7 x64.

Member Avatar for Techno22
0
278
Member Avatar for dartiss

Hi, I have a couple of sites that are very much read-only (i.e. the sites are complete and not being modified). Is there a way, possibly via .htacces, to make these sites so that nothing could be uploaded to their directories maliciously? Basically, a way to lock the site down. …

Member Avatar for pixelsoul
0
87
Member Avatar for kubyk

My computer has been severely hacked. Well 2 laptops actually. And it looks like my router also. Problems noted here: 1. Email accounts routinely hacked even after changing passwords and using keypass in the securist way. Suspected keyloggin occuring somewhere in the stream. 2. Something causing my typing to be …

Member Avatar for caperjack
0
287
Member Avatar for OsaMasw

hello guys, unfortunly my website got hacked few hours ago, and after investigations I found the was a c99.php file on my server so i deleted it and stopped any upload proccess and change back my chmod to default I want to ask how to prevent php files from being …

Member Avatar for naphets
0
2K
Member Avatar for happygeek

With Twitter now more than 100 million accounts strong, and with 50 million Tweets per day, you might be excused for thinking there's no stopping the micro-blogging network. Until, that is, you start exploring the darkside of Twitter. But is Twitter evil? [attach]16201[/attach]You only have to look at the IT …

Member Avatar for halenmartinez
0
386
Member Avatar for happygeek

Whether you travel on business or for pleasure, the chances are pretty high that you will make use of the Internet while abroad. If you are staying at a hotel then, given the high cost of international data roaming on most mobile networks, the chances are that you will make …

Member Avatar for LastMitch
0
812
Member Avatar for happygeek

The news wires have been buzzing over the weekend after it emerged that the Raspberry Pi website had been hit by a 'million zombie' Distributed Denial of Service (DDoS) attack during the week. Although the outage was relatively brief, with the Raspberry Pi Foundation admitting the attack with a Twitter …

Member Avatar for LastMitch
1
1K
Member Avatar for happygeek

Microsoft Security Advisory notices do not, as a rule, make the media sit up and take much notice. Not least as they have become relatively commonplace over the years, but every now and then one comes along which may grab some press attention. Take [MSA 2718704](http://technet.microsoft.com/en-us/security/advisory/2718704) for example. ![dweb-microsoftflamed](/attachments/large/0/dweb-microsoftflamed.jpg "dweb-microsoftflamed") …

Member Avatar for LastMitch
2
334
Member Avatar for happygeek

With the London 2012 Olympics due to open in just a few days time, the expected push by the bad guys has started. No, I don't mean the banning of wearing Pepsi T-Shirts in the Olympic Stadium as it might upset official sponsors Coke, or the fact that nobody is …

Member Avatar for LastMitch
1
602
Member Avatar for happygeek

An ongoing attack aimed at users of the Apple Mac platform is being reported by security researchers. [AlienVault,](http://www.alienvault.com) which has discovered these weaponised attacks in the wild, warns that regular Mac users without IT security software installed could be at risk of infection and hijacking. ![alien](/attachments/small/0/alien.jpg "align-right") The researchers suspect …

Member Avatar for LastMitch
1
540
Member Avatar for happygeek

According to security experts at data governance outfit Varonis, 2013 will be the year of the salami attack. On the plus side, they also predict that the world will not come to an end on December 21st 2012. It's not just salami that your business needs to worry about in …

Member Avatar for <M/>
0
384
Member Avatar for happygeek

Earlier this week, an iPhone jailbreaking guru called pod2g revealed how even the very latest beta versions of iOS 6 cannot prevent the iPhone from being vulnerable to SMS text message spoofing. This technique is often employed by spammers and scammers alike when targeting the smartphone user in order to …

Member Avatar for LastMitch
0
1K
Member Avatar for happygeek

Continuing our round up of 2013 IT security vendor predictions, we've got the thoughts of three of the big Infosecurity Europe exhibitors: Palo Alto Networks, SafeNet and Kaspersky Lab. ![dweb-infoseceurope](/attachments/small/0/dweb-infoseceurope.jpg "align-right") Brian Tokuyoshi from Palo Alto Networks predicts that social media, data decryption and virtualised network security will be high …

Member Avatar for LastMitch
0
231
Member Avatar for happygeek

Anonymous hacktivists took aim at the websites of the UK Justice Department, the Department of Work and Pensions, the Home Office and even the Prime Minister's own Number 10 site. All of them were successfully targeted overnight and went down for a period of time. The attacks were part of …

Member Avatar for LastMitch
0
236
Member Avatar for happygeek

Over the weekend I wrote a news story for DaniWeb which revealed how the iPhone was vulnerable to SMS text message spoofing. This went under the title "[Why Apple was right about iMessage 'fix' for iPhone SMS spoofing](http://www.daniweb.com/hardware-and-software/apple/ios-iphone-os/news/431373/why-apple-was-right-about-imessage-fix-for-iphone-sms-spoofing)" because, simply put, SMS text messaging is exposed to this kind of …

Member Avatar for LastMitch
2
589

The End.