US Labor Department Website is being Operated by Chinese Hackers and serving Malware

An interesting article from our content partner at hackersnewsbulletin.com, a must read:
Malicious activity in US government’s Department of Labor website uncovered by AlienVault Labs, it is compromised by Chinese Hackers known as Deep Panda or any individual Group.

No one knew about this and AlienVault tells the Truth about that website that how US Labor website redirect users to Malicious code.

Read more here.

Sensitive Army database of U.S. dams compromised; Chinese hackers suspected

A very interesting article by our partners at HackersNewBullentin.com on

According to a report at FreeBeacon.com, U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials.
 
China is  preparing to conduct a Future Cyber Attack on the Electrical Power Grid and it will raise a new concern for the U.S. Army Corpsof Engineers’ National Inventory of Dams (NID).

According to the Intelligence reports, the Corps of Engineers’ National Inventory of Dams was hacked by an unauthorized user and the user believed to be from China, beginning in January and uncovered earlier this month.

Read more here.

See how beautiful a DDoS attack can look

A posting From Cnet News in there security and privacy section: Using the Web app Logstalgia, a developer has managed to capture on video a visual impression of what happens during a DDoS attack.

We’ve all heard of a distributed denial of service (DDoS) attack and know what it is: when a person or people attempt to take down a Web site by flooding it with connection requests. These max out the site’s bandwidth, making it unable to accept new requests. The attacks are usually automated and can be accomplished in a variety of ways. The loss of traffic during the attack itself, and the recovery afterward, can end up costing Web sites quite a lot.

But what does that actually look like? Well, nothing by itself; but thanks to a Web site traffic visualization tool called Logstalgia, Ludovic Fauvet, developer of the Web site VideoLAN (which created and distributes the free multimedia player VLC), managed to capture an April 23 DDoS attack on his site.

 

To read more click here: 

Google tightens up Play Store policy, officially bans “off-market” updates…

A posting from Naked Security:  Google has made a number of changes to its Android Play Store ecosystem recently.

Part of the reason is that Mountain View has been copping lots of flak for the prevalence ofmalware in unofficial application markets, often in pirated apps.

That’s a trifle unfair, since one of the attractions of Android over Apple’s iOS is that it’s actually possible to shop “off-market” if you wish.

Sure, there’s a greater risk of shooting yourself in the foot if you do, but you’re not forced to live dangerously, and even if you do go outside the Play Store, a little caution goes a long way towards keeping you safe.

More realistically, however, Google has been criticised for the appearance of malicious apps in its own Play Store.

 

To read more click here: 

Spamhaus DDoS Suspect Arrested

A posting from Information week in there Security section: Police in the Netherlands Friday announced the arrest of a 35-year-old Dutchman on charges of having launched “unprecedented heavy attacks on the non-profit organization Spamhaus.”

The suspect, identified only as “S.K.” by Dutch police, has been named in multiple news reports as Sven Kamphuis, the leader of Amsterdam-based “bulletproof hosting provider” Cyberbunker, as well as service provider CB3ROB. Kamphuis has been a vocal proponent of — although not, he’s claimed, participant in — the Stophaus.com movement that seeks to undercut anti-spam intelligence service Spamhaus.

 

To read more click here:

Syrian Hacktivists Hit Guardian Twitter Feeds

An article form Information week about Syrian Hacktivists Hit Guardian Twitter Feeds:  The Syrian Electronic Army (SEA) announced Sunday that it took over 11 Twitter feeds belonging to Britain’s Guardian newspaper, including its book, film, photography and travel feeds, as well as multiple journalists’ accounts. It also posted passwords — composed of 15 randomized characters — it claimed were for four of the compromised accounts.

By Monday, many of the accounts were suspended by Twitter, although SEA appeared to still be compromising additional accounts, including theGuardian’s business feed. “Follow the Syrian Electronic Army … Follow the truth!” read a message posted to some compromised Twitter accounts.

To read more click here: