Blog Posts Tagged with "Attacks"

03b2ceb73723f8b53cd533e4fba898ee

W32.Narilam, the malware that hit databases in Middle East

November 25, 2012 Added by:Pierluigi Paganini

W32.Narilam is a worm that attempts to spread by copying itself to all drives and certain shared folders on the compromised computer, the malware doesn’t include modules to steal information from the victims....

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Skype: serious vulnerability found

November 15, 2012 Added by:Pierluigi Paganini

The news is circulating with insistence on the net, Skype is suffering from a vulnerability that can expose its users to serious risks, due this reason it has suspended the password reset process.The Russian Blog Pixus.ru published a post where it described a workaround to hijack the accounts of the famous application...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Man-in-the-Middle Redux

November 05, 2012 Added by:Tripwire Inc

This attack used to be fairly innovative. But not so much anymore. Would-be attackers can buy the basic components “off the shelf” using ready-made toolkits like Ettercap, Mallory (I love the creative use of the classic MITM name), and dsniff. If you’d like a better look at how it works, this is a good video...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Attack by Team GhostShell Against Russian Government

November 05, 2012 Added by:Pierluigi Paganini

Hacktivism represents a serious problem for governments and intelligence agencies. The hack of IT infrastructure and the exposure of confidential information is a serious menace. In the past Anonymous has hit several governments and law enforcement agencies in the UK, US, Japan, and India...

Comments  (0)

1de705dde1cf97450678321cd77853d9

The Search for Infosec Minds

November 01, 2012 Added by:Ian Tibble

Since the early 2000s, I have commented in different forms on the state of play, with a large degree of cynicism, which was greeted with cold reservation, smirks, grunts, and various other types of un-voiced displeasure, up to around 2009 or so. But since at least 2010, how things have changed...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

US Responses to Cyberattacks – Circus du Jour

October 31, 2012 Added by:Joel Harding

Who is in charge? Don’t answer that, you don’t want to know. Who is in charge of our national response to anything? It depends? What do you mean? Do you mean to say that there is no one person or office, no agency or even a department with the mission of coordinating a national response?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Wrong response to zero day attacks exposes serious risks

October 22, 2012 Added by:Pierluigi Paganini

Recent revelations on Flame raise the question on the efficiency of zero day vulnerabilities, software bugs that hackers exploit to avoid security defenses on targeted systems. The real problem when we talk about zero-day is related to the duration of the period in which hackers exploit the vulnerability...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Prolexic Q3 2012 ... a new generation of DDoS attacks

October 20, 2012 Added by:Pierluigi Paganini

This is significant because very few companies or organizations have the necessary network infrastructure to deal with such attacks. There might be some companies with popular websites such as Google or Facebook that are able to handle such high-bandwidth floods, but most companies are not...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Difficulties with Attribution in a Digital World

October 16, 2012 Added by:Rafal Los

Attribution is necessary for secondary action, but not always for defense. Secondary action being retaliation, accountability, prosecution, etc. It's more important at the instant of attack to be able to make the attack stop, then afterwards be able to move on and assign blame and make the legal case...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame, miniFlame, the mystery of an on going cyber espionage campaign

October 16, 2012 Added by:Pierluigi Paganini

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new malware which hit the country named Flame, also known as Flamer or Skywiper. Kaspersky Lab and CrySyS Lab also identified the malware, recognized as a powerful cyber espionage tool that hit mainly Windows systems in the Middle East...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

What is the Dorkbot Worm That is Attacking Skype Users?

October 12, 2012 Added by:Pierluigi Paganini

What would happen if a malware compromises a communication system adopted daily by 663 million users? Security experts have issued an alert to Skype users about an ongoing attack that tries to induce them to click a link that spreads malware...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Ponemon Statistics on Cost of Cybercrime for 2012

October 10, 2012 Added by:Pierluigi Paganini

The research presents an alarming scenario, every company is daily the victim of attacks from malware to DDoS with dramatic consequences. Data breaches, system destruction and the violation of networks are the most common, estimated an averaging 1.8 successful attack each week...

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Offensive Cyber Capabilities Need to be Built and Exposed Because of Deterrence

October 09, 2012 Added by:Jarno Limnéll

Cyberspace, the fifth dimension of warfare, has already become an important arena of world politics, especially since we are living in a time in which the lines between war and peace have blurred. The digital world has become a domain where strategic advantage can be either lost or won...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Attacks Cause Serious Damage to Internet Connection in Iran

October 05, 2012 Added by:Pierluigi Paganini

Iran was recently blamed for attacks onoil companies and banks. This time the scenario appears reversed, as attacks targeted Iranian infrastructure and communications, causing serious damages to Internet connections...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

Another HAck-bAck Blog

October 04, 2012 Added by:Jim Palazzolo

Is it the legal structure that makes it taboo, or the ambiguity of the target? What are the implications? Could a corporation accidentally set off a cyber flashpoint by attacking targets in other countries? And, is it an organization’s legal right, like an individual, to defend itself?

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cyber War: Fact from Fiction in the shadow of the Tallinn Manual

October 04, 2012 Added by:Rafal Los

Are we involved in open cyber warfare? Definitely not. We are definitely involved in a Cold War style set of guerilla incursions aimed at strategic assets for espionage or financial damage. This hasn't yet moved direct confrontation - but that may simply be a matter of time...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »