Blog Posts Tagged with "Source Code"

69dafe8b58066478aea48f3d0f384820

Update 3: Hackers May Leak Norton Antivirus Source Code

January 05, 2012 Added by:Headlines

YamaTough has posted more information from the alleged breach on Google+ in an effort to prove this is not a spoof, an excerpt is as follows...

Comments  (23)

6d117b57d55f63febe392e40a478011f

Update: File Appears to Contain 2006 Norton AV Source Code

January 05, 2012 Added by:Anthony M. Freed

Infosec Island has been provided with a file that appears to contain source code for the 2006 version of Norton antivirus. We have provided Symantec with the file and are awaiting their analysis. We will not be releasing the file due to the sensitive nature of the information...

Comments  (6)

7b072d611db66025d89ff3137dcddfb3

Want the Source Code to Stuxnet? Come and Get It

October 20, 2011 Added by:Joel Langill

Though this does not reflect true "source code", it does provide high-level language which can be re-compiled for another purpose. I reviewed much of the code, and though it did not contain 100% of the Stuxnet functionality, it did contain a large portion of the working malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Unveils Twitter Hijack Tool: URGE

September 09, 2011 Added by:Headlines

Anonymous has released an purported Twitter hijacking tool called URGE, posting the source code for the exploit on Github. Using the tool could be considered an illegal act, and those that choose to download and perform Twitter hijacking operations could find themselves facing legal repercussions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SpyEye Trojan Source Code Now in the Wild

August 17, 2011 Added by:Headlines

"Now that SpyEye has been outed, it is only a matter of time before this becomes a much larger malware threat than any we have seen to date. So for the next few months, please hold onto your seats people… this ride is about to get very interesting..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Did LulzSec Hack Apple's iCloud and Steal Source Code?

June 24, 2011 Added by:Headlines

An anonymous Pastebin posting from June 21 states that hackers claiming to be part of the LulzSec collective successfully breached Apple's iCloud networks several weeks ago. The posting claims that the intruders mapped the network and "grabbed all their source code and database passwords..."

Comments  (1)

959779642e6e758563e80b5d83150a9f

Microsoft Gives Source Code to Chinese Government

June 13, 2011 Added by:Danny Lieberman

Having access to Windows source code has made it easier for Chinese cyber attackers to write attack code to penetrate and compromise US defense contractors, critical infrastructure and activist groups like change.org - who all still use highly vulnerable Windows monoculture products...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Think You Can’t Afford Code/App Testing? Think Again...

May 19, 2011 Added by:Brent Huston

Today, you have a plethora of code review automation tools and source code scanners. These tools make an easy way to pick the low hanging (and sometimes higher) vulnerabilities out of your code long before it is exposed to malicious outsider/insider contact...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Source Code for Zeus Crimeware Toolkit Disclosed

May 11, 2011 Added by:Headlines

"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Secure Your Chance to Win a Copy of 'The Source Code'

May 08, 2011 Added by:Infosec Island Admin

In an age when people are becoming more reliant on computers for both work and personal use, exposure to cyber-hackers and the risk associated with identify theft is escalating at an alarming rate. William A. Thau’s novel seems to be an eerie foreshadowing of recent events...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Supporting "Unmaintainable" Applications

May 08, 2011 Added by:Rafal Los

A solid Software Security Assurance program takes into consideration the legacy risks from all the applications that have existed before a security program came into being. The issues that surround legacy applications are complex, and can create headaches for security teams...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Penetration Testers: Backtrack 5 Release Slated for May

May 04, 2011 Added by:Headlines

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), will support 32 and 64 bit architectures, and will officially support KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Source Code is the New Hacker Currency

May 01, 2011 Added by:Rafal Los

The reason we're seeing security companies as a big, bright, shining target recently is that attackers finally realized they were sick of hitting each target individually - and wanted a way to hit millions of high-valued corporate safes all at once, potentially...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

WordPress Hack Exposes Proprietary Source Code

April 14, 2011 Added by:Headlines

"Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed... We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners’ code..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee Website Vulnerable to XSS and Other Attacks

March 29, 2011 Added by:Headlines

"The McAfee SECURE trustmark only appears when the website has passed our intensive, daily security scan. In other words, the presence of this label means that the website is not vulnerable to the exact same vulnerabilities McAfee currently has.."

Comments  (1)

959779642e6e758563e80b5d83150a9f

Using DLP to Protect Your Source Code

January 17, 2011 Added by:Danny Lieberman

This points at a wider problem for software developers everywhere. Whether you collaborate with a partner on development or outsource an entire project, you expose sensitive software and intellectual assets to people people with limited allegiance to your firm...

Comments  (1)

Page « < 1 - 2 - 3 > »