Entries by fdesir

Spear Phishing Cause of South Korean Cyber Attack

An article from Threat Post on Spear Phishing: It appears that a spear phishing campaign was the genesis for the wiper malware infections that ultimately knocked several prominent South Korean banks and broadcasters offline last week, according to a malware analysis performed by researchers from the Finnish cybersecurity firm F-Secure. The South Korean NSHC Red […]

Korean Mystery Malware Wiped Unix, Windows Machines

An article from Tech New Daily  about a malwere wiped unix windows machines:  The malware that hit South Korean banks and broadcasters yesterday (March 20) was a wrecking machine, deleting core files on both Windows and Unix-based machines and rendering them inoperable, researchers have found. Analysis by security firms AlienVault, McAfee, Sophos, Symantec and Trend […]

New adware Trojan circulating that targets Mac OS X systems

An article from Cnet about New adware Trojan circulating that targets Mac OS X systems: A new Mac OS X Trojan is making the rounds, installing an adware plug-in that renders ads on Web pages to generate revenue for its author. Dubbed Trojan.Yontoo.1, it is the most prominent of an increasing number of adware Trojans […]

South Korea hit by cyber attack.

An article  from  Ehacking News  on South Korea being  hit by cyber attack:  Yesterday South Korea was hit by a massive cyber attack . The attack disturbed the functioning of three banks and two TV channels. The bank were hit such that no financial transactions can be made. The TV channels were affected by locking their computers hence not allowing the TV […]

Latest iPhone Security Update Already Beaten

An article from Tech News Daily on iphone security update: Security compromisers may not be the most beloved demographic on the Web, but they’re nothing if not industrious. Apple’s latest iOS update, 6.1.3, has been out for less than two days, but one trickster has already infiltrated the update. Using only a paperclip and some […]

Five Hurdles That Slow Database Security Adoption

An article from dark reading in there Database Security section:  In spite of a fairly mature product set and boardroom directives to protect sensitive databases, the average enterprise today still has a long way to go before it’ll apply comprehensive database security technology and processes to all of their critical databases, let alone all of […]

‘Chameleon Botnet’ takes $6-million-a-month in ad money

An article from Cnet news  about Botnet : A newly discovered botnet has found a way to siphon cash from advertisers. Spider.io, a security researcher, yesterday announced that it has discovered a new botnet, called Chameleon, that’s targeting “at least” 202 Web sites. The botnet is made up of over 120,000 host machines running Windows, […]

Exposed Devices Used as Botnet to Scan Internet

An article from threat post about botnet: A controversial Internet scanning project has come under fire for illegally accessing and running code on remote machines. The Internet Census 2012 project, revealed Sunday in a post to Seclists.org, discovered 420,000 embedded devices accessible using default credentials. The unnamed researcher behind the project then used the devices […]