Blog Posts Tagged with "Attack"

69dafe8b58066478aea48f3d0f384820

Cyber Attack Hits Oak Ridge National Laboratory

April 19, 2011 Added by:Headlines

"Certainly what we’ve seen is very consistent with the RSA attack. Whoever is doing this attempts to get a foothold in the network system, works patiently and relatively quietly to try to expand that and is looking for specific types of information..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Faux Facebook Message Spreading Malware

April 13, 2011 Added by:Headlines

"Just because an email claims to hail from password@facebook.com, support@facebook.com or message@facebook.com, realize that its headers could have been forged - and don't blindly follow its instructions unless you're absolutely certain it's legitimate..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Inside The LOIC: Anonymous Is Still Using It?

April 07, 2011 Added by:Infosec Island Admin

A source has sent in some information on the DoS attacks ongoing at Sony, and I have to say I was surprised that the Anon’s are still using the LOIC. There is some interesting information in the data sent, Such as a server called: "staff.anonops.ru vlad.anonops.ru". Really? Staff???

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Sony Becomes Latest Operation Payback Attack Target

April 04, 2011 Added by:Headlines

The rogue hacktivist movement known as Anonymous has now turned its anti-copyright campaign Operation Payback against the Sony Corporation. The operation comes just one week after a similar attack was launched against the RIAA, which is seeking trillions of dollars in damages from LimeWire...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Stuxnet’s Potential for A Chernobyl-Style Incident at Bushehr

April 04, 2011 Added by:Infosec Island Admin

People in the know are worried that Stuxnet was released into systems that were not completely understood. Iran, being as hard to get intel on, may have had configurations that the creators of Stuxnet did not account for, and it could indeed have caused a larger catastrophe...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LizaMoon Malware Attack Continues to Spread Rapidly

April 04, 2011 Added by:Headlines

The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Users Targeted by Cross-Site Scripting Exploit

March 30, 2011 Added by:Headlines

Facebook users were lured to the infected websites with specially designed spam messages, and the messages posted to their profile walls that contained links to infected sites, which caused the worm to spread rapidly across the network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

European Union Parliament Also Under Cyber Attack

March 29, 2011 Added by:Headlines

Following on the heels of a cyber assault against the European Union's Commission and External Action Service, reports have surfaced that the EU Parliament's systems are also being targeted in an attack. “This is not a couple of teenage boys hacking into the [EU] institutions..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

RIAA Targeted by Anonymous' Operation Payback

March 28, 2011 Added by:Headlines

The rogue hacktivist movement Anonymous is apparently breaking out the Low Orbit Ion Cannon again for a reprise of the Operation Payback campaign, this time setting their distributed denial of service (DDoS) attack sites on the Recording Industry Association of America (RIAA)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iranian Hacker Claims Comodo Digital Certificate Heist

March 28, 2011 Added by:Headlines

The supposed lone-hacker now claiming responsibility, who dubbed him or herself "Comodohacker", said in their statement that the attack on Comodo was in retaliation for the release of the Stuxnet virus that damaged equipment at Iran's Natanz uranium enrichment facility...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivist Maintains Attack on Westboro Baptist Church

March 24, 2011 Added by:Headlines

The DoS attacks against WBC sites have now exceeded one month in duration. The Jester uses a DoS tool called XerXeS to perform an application level attack which can be performed by a single low-spec machine with relatively few packets, whereas traditional TCP-based attacks require multiple machines...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Comodo Fingers Iranian Hackers in Digital Certificate Heist

March 24, 2011 Added by:Headlines

"We believe these are politically motivated, state-driven/funded attacks. One of the origins of the attack that we experienced is from Iran. What is being obtained would enable the perpetrator to intercept Web-based email/communication," said Melih Abdulhayoglu, the CEO and founder of Comodo...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

European Union Commission Suffers Serious Cyber Attack

March 23, 2011 Added by:Headlines

The Commission and External Action Service experienced a "serious" cyber attack as officials were preparing for a summit to discuss the future of the E.U.'s structure and unified operations in regards to multiple global political events. "We're often hit by cyber attacks but this is a big one..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Experts Continue Efforts to Define Cyber War

February 24, 2011 Added by:Headlines

Ultimately, the attribution and origin of an attack combined with the current political environment will determine if a cyber offensive will be characterized as an act of "warfare", and it may not be until after the fact that we can all agree that we know know an act of cyber war when we see one...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Continues to Pursue Lawless Exploits

February 07, 2011 Added by:Headlines

Followers of the movement claim to champion free speech and freedom of information, but their actions more closely resemble the kind of thuggery employed by criminal networks who seek to silence a free press...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attacking Computers and Smartphones via USB Cable

January 21, 2011 Added by:Headlines

Researchers have designed code which makes it possible to pilfer data when a smartphone is connected by USB cable with a computer. The code adds a mouse or keyboard function to the USB driver that allows the attacker to take control of the units and download files or upload malware...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked