Post

Visualizzazione dei post da Novembre, 2015

Hacker holds UAE bank to ransom, demands $3m

Can't get a break: Pwned Linux ransomware pwned again, infects 3000

Belkin's N150 router is perfect for learning hacking skills – wait, what, it's in production?

Cisco's telco-grade uber-routers can make almost anyone root

Millions of Internet Things are “secured” by the same “private” keys |

How Corporate America keeps huge hacks secret November 30

VPN users menaced by port forwarding blunder • The Register

Port Fail: Vulnerability reveals real IP | Perfect Privacy

Cops arrest 2 for operating “Fully UnDetectable” malware service |

Just in time for Xmas: Extra stealthy Point of Sale malware • The Register

Nota senza titolo

Nota senza titolo

Mr Grey, the Russian hacker who helped haul in 1.2 billion logins • The Register

Researcher reveals Chinese e-crime shopping list • The Register

Dell apologizes for HTTPS certificate fiasco, provides removal tool | Ars Technica

Lazy IoT, router makers reuse skeleton keys over and over in thousands of devices – new study • The Register

Hacker predicts AMEX card numbers, bypasses chip and PIN • The Register

Nota senza titolo

Nota senza titolo

Nota senza titolo

Pen tester sounds alert over 'gaping' flaws in Brit alarm platform

Superfish 2.0 worsens: Dell's dodgy security certificate is an unkillable zombie

British duo arrested for running malware encryption service

World's most complex cash register malware plunders millions in US

Dell does a Superfish, ships PCs with easily cloneable root certificates | Ars Technica

Superfish 2.0: Dell ships laptops, PCs with gaping internet security hole • The Register

United Airlines Bug Bounty: An experience in reporting a serious vulnerability - Randy Westergren

Criminal Ruskie BOFHs help hackers steal $790 million in three years • The Register

Android adware can install itself even when users explicitly reject it | Ars Technica

Criminal are mostly hacking-by-numbers with exploit kits • The Register

Hacking group Strontium dogs NATO and government targets • The Register

Vicious Chrome V8 JavaScript Exploit Leaves All Android Devices Ripe For Attack | HotHardware

Botnet that enslaved 770,000 PCs worldwide comes crashing down

Badware in the firmware all over the place

Target stores attacked by pornographic pranksters - BBC News

Ransomware-as-a-service surfaces, wants 10 percent profit cut

FastMail falls over as web service extortionists widen attacks and up their prices • The Register

Naked Security

Latest Android phones hijacked with tidy one-stop-Chrome-pop • The Register

Booming crypto ransomware industry employs new tricks to befuddle victims | Ars Technica

XOR DDoS Botnet Launching 20 Attacks a Day From Compromised Linux Machines | Akamai

Severe SAP HANA vulnerabilities allow hackers to take full control | ZDNet

Packet floods can bork Borg's security kit

Comodo kills 'forbidden' certs

Severe SAP HANA vulnerabilities allow hackers to take full control | ZDNet

The Economist spreading malware

Epic Fail: Power Worm Ransomware Accidentally Destroys Victim's Data During Encryption - Softpedia

What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability. |

Naked Security

ProtonMail: encrypted email provider held ransom by hackers | Technology | The Guardian

ProtonMail still under attack by DDoS bombardment • The Register

An Analysis of Reshipping Mule Scams | Bentham's Gaze

Stuxnet-style code signing of malware becomes darknet cottage industry

US, UK big banks to simulate mega-hacker cyber-attack

Want Some Nuclear Power Plant 'Zero-Day' Vulnerabilities? Yours For Just $8, 000 - Forbes

CSC, NetCracker IT staff worked on US military telecoms 'without govt security clearance' • The Register

Medical device password

Vaticano: violati i file riservati di un computer, sospetti sui «corvi»

Researchers Find Vulnerabilities in Use of Certificates for Web Security

Three quarters of cars stolen in France 'electronically hacked' - Telegraph

Accountant robbed of 1600 records in Xero tax fraud raid: report • The Register

Hacker Steals, Drives Away Jaguar XFR Exploiting Flaw in Wireless System