Five Ways To Better Hunt The Zebras In Your Network
An article from dark reading about employees, and their computers, who are doing something odd: At the recent RSA Conference in San Francisco, Chris Larsen, a malware researcher at Web security firm Blue Coat Systems, talked about zebras. Not the kind on that roam the African savannah, but the kind that sit at computers behind the corporate firewall.
Zebras are the employees, and their computers, who are doing something odd. Defenders are right to want to protect the zebras in their network, but defenders should occasionally “radio tag” and follow their zebras to see where they go, he said.
to read more click here:
Bypassing Android encryption by freezing android phones
German Security Researchers have discovered that freezing an Android phone allows hackers to access the Encrypted data stored in the phone.
The encryption method introduced in the Android version “Ice cream sandwich” by Google. The researchers bypassed this encryption system method by freezing the smartphone for an hour.
To read more click here:
Hacktivists plan to resume DDoS campaign against U.S. banks
An interesting article from SC Magazine about DDOS: Citing inadequate efforts to remove an anti-Muslim video from the web, a hacktivist group is calling for more distributed denial-of-service (DDoS) attacks to be launched against U.S. bank sites.
The collective, known as Martyr Izz ad-Din al-Qassam Cyber Fighters, suspended its initial DDoS campaign in late January after an Innocence of Muslims video with 17 million views was removed from YouTube. But in a Pastebin message posted at the time, the group warned that attacks would continue if a list of other highly viewed videos on the site weren’t pulled.
To read more click here:
Hackers fail to crack Chrome OS
An interesting article from YAHOO News tech section: Google (GOOG) offered hackers a chance at a big pay day if they could crack its Chrome OS platform. The company held its annual Pwnium competition at the ConSecWest security conference in Vancouver this week where it put $3.14159 million up for grabs.
While a number of hackers attempted to get a piece of the Pi, a Google spokesperson confirmed in a statement to TechCrunch that none of them succeeded in fully cracking the operating system.
To read more click here:
Pwn2Own Hackers Bring Popular Browsers To Their Knees
A very interesting article written by Brian Prince a contributing writer for Dark Reading.
The results from the annual Pwn2Own hacking contest are in, and the score is as follows: hackers one, software zero.
During the past two days, security researchers pwned Microsoft Internet Explorer 10, Google Chrome, and Mozilla Firefox at the competition, which was held at this week’s CanSecWest Applied Security conference in Vancouver. Besides the browsers, this year’s researchers also successfully compromised Oracle Java, Adobe Flash Player, and Adobe Reader. The only browser that was part of the competition that was not compromised was Apple Safari running on Mac OS X Mountain Lion.
Collectively, the researchers’ winnings totaled $480,000 in cash prizes, in addition to the hardware they compromised and ZDI awards points.
“To remind you: in the world of PWN2OWN, ‘successful attack’ means that merely by browsing to untrusted web content, you’re able to inject and run arbitrary executable code outside the browser,” blogs Paul Ducklin of Sophos. “In the real world, that means you could pull off a drive-by install, where you bypass all intended protections, preventions and pop-up warnings from the browser.”
Read the rest here.
Cyber Crime gang arrested for hacking Dubai exchange companies accounts
An interesting article from Ehacking news: The Dubai Police have arrested a cyber crime gang who were able to transfer more than 2 Million dollars(Dh7 million) from Dubai Exchange companies’ accounts.
The police said that a gang of Asians and Africans work with hackers to hack into websites and systems of companies in Dubai to transfer the money.
To read more click here:

