Facebook's Instagram photo-sharing service that could allow a hacker to seize control of a victim's account.
The attack was developed by Carlos Reventlov around a
vulnerability he found within Instagram in mid-November. He notified
Instagram of the problem on Nov. 11, but as of last Tuesday, it had not been fixed.
The vulnerability is in...
Australia's Small Business Point of Sale System hacked By Romanian Crime Gang
Nov 29, 2012 | comments

Police have smashed a Romanian organised crime gang that allegedly hacked into the computer systems of small businesses, with credit card details of 30,000 Australians used in $30 million worth of illegal transactions around the world.
Australian and Romanian national police have broken up a ring of hackers
blamed for pillaging the point-of-sale...
IAEA Data Breach Part 2
Nov 29, 2012 | comments

In response to IAEA's Previous data breach and official statement, They're now publishing additional
information to prove there ability to gain access to highly sensitive information,
Including Confidential 'SafeGuard' Documents, Satellite Images, Official
letters, Presentations and etc.Hoping positive IAEA's decision as an
...
WORM_VOBFUS Variants Seen Spreading On Facebook
Nov 29, 2012 | comments

Based on our initial analysis WORM_VOBFUS variants seen spreading on Facebook does not exhibit new
routines, but it is a good reminder for users about well-known but
easily forgotten safe computing practices.
The significant increase in infection is curious because Windows 7 and
Windows 8 PCs will not launch autorun.inf files, and Microsoft...
US 100 Million $ Secret Underground Facility
Nov 29, 2012 | comments

US Building A Secret Underground construction project planned for Israel called Site 911. Project will cost up to $100 million, take more than two years to
complete, and can only be built by workers from specific countries with
proper security clearances. Palestinians need not apply.
When complete the well-guarded compound will have five levels...
Bypass Windows 8 Password Login Screen
Nov 28, 2012 | comments

1. Start typing "netplwiz" (without quotes) in the Windows 8 start screen
and hit enter to launch the "User Accounts" control panel (on older versions of Windows, click "User Accounts Control Panel").
2. Enter your password if prompted.
3. In the
window that opens, uncheck the box stating "Users must enter a username
and passwords...
Trading Forex Website Targeted
Nov 28, 2012 | comments

A FOREX trading website called "Trading Forex," located at hxxp://tradingforex.com has been contaminated with a malicious Java
applet that is designed to install malware on the systems of visiting
surfers.
FOREX is the foreign exchange market where international currencies are
traded, and nowadays, it's used by millions of people around...
Google Webmaster Tools security breach
Nov 28, 2012 | comments

Google site that helps website owners manage how their site appears in
Google, diagnose problems, and optimize traffic, is currently
experiencing a major security breach.
Old accounts are being re-verified, says
Search Engine Journal. That may not sound like a big deal, but it’s a
potential disaster for anyone who has had search engine...
Anonymous Hacks DEBKA.com
Nov 27, 2012 | comments

DEBKA.com is an Israeli-Based News-Agency, which has tied relations with
Israeli Intelligence Agency (MOSSAD) and Military sources, “Tongue of
MOSSAD”. DEBKA first started around 2000 in purpose of polluting media
with Zionist-Oriented news and rumors.
DEBKA also analyzes on how people react to news and information offered...
Spy Any Phone Via Hardware Hack With AudioJack Malware
Nov 27, 2012 | comments

The researcher Atul Alex has presented at last edition of
International Malware Conference (MalCon) how it is possible to attack
every mobile devices with a special hardware designed using common
electronic components.
Atul Alex presented a paper
that covers “abusing voice dialing and combining Arduino /
Microcontroller to steal private data...
Java Zero-Day Exploit on Sale
Nov 26, 2012 | comments

Miscreants in the cyber underground are selling an exploit for a previously undocumented security hole in Oracle’s Java software that attackers can use to remotely seize control over systems running the program, KrebsOnSecurity has learned.
The flaw, currently being sold by an established member of an invite-only Underweb forum, targets an unpatched...
Anonymous Leak Emails from Syrian Ministry
Nov 26, 2012 | comments

Anonymous Hacker managing Operation Syria (OpSyria) have released 1 GB of emails dump from Syrian Ministry of Foreign Affairs. Files are in files are in Arabic language.
Documents includes scanned copies of Syrian ministers passports, details
about an arms transport from Ukraine, report which shows that 200 tons
of Syrian bank notes have been...
REDHACK
Nov 26, 2012 | comments

A group of Internet hackers appeared Today on charges of terrorism, the first time alleged cyber
criminals have been put on trial in Turkey .The 10 members of the "Redhack" group are accused of belonging to an
armed terrorist organisation, illegally obtaining confidential documents
and personal information, as well as cracking into private systems...
International Atomic Energy Agency (IAEA) Data Breech
Nov 25, 2012 | comments
.jpg)
Another victim of cyber attack ,The group of hackers who named itself Parastoo Farsi have exposed contacts
for more than 100 nuclear experts and scientists from UN nuclear agency International Atomic Energy Agency (IAEA), the word Parastoo is
Farsi and referes a bird species like the swallow and an Iranian girl’s
name.
...
Rise Of The Machines : Human Judgment Required
Nov 24, 2012 | comments

As custom government malware becomes an increasingly common
international weapon with real-world effects—breaking a centrifuge,
shutting down a power grid, scrambling control systems—do we need legal
limits on the automated decision-making of worms and rootkits? Do we,
that is, need to keep a human in charge of their spread, or of when they
...
New Malware Targeting SQL Db's In Iran
Nov 23, 2012 | comments

Security firm Symantec has discovered a specialised worm called W32.Narilam that can compromise SQL databases. Symantec reports
that the malware "speaks" Persian and Arabic and appears to target
mainly companies in Iran. Narilam is, therefore, reminiscent of Stuxnet and its variants.
Narilam spreads via USB flash drives and network shares....
South Carolina Department of Revenue Data Breech
Nov 23, 2012 | comments

The South Carolina Department of Revenue recently suffered a major
data breach, leading to 3.8 million tax payers and their 1.9 million
dependents having their Social Security numbers exposed along with
credit cards (5K) and bank account information (3.3 million
accounts).The attacker gained access to 44 servers, installing 33 pieces
of malicious...
Iran's New Smart Card For Internet Monitoring
Nov 22, 2012 | comments

A BETTER WAY TO CITIZEN SURVEILLANCE :
Iran's Government introduces a biometric Smart card for monitoring there citizens and opposition on the Internet., which will serve as the access map to the Web. Without
registration of "Smart card", the Internet for citizens remains closed .
Early next year is the "smart card" issued
in a...
Latest Linux malware Doing iFrame Injections
Nov 21, 2012 | comments (3)

New Linux malware can automatically hijack websites
A few days ago, an interesting piece of Linux malware came up on the Full Disclosure mailing-list.
It's an outstanding sample, not only because it targets...
AT&T iPad Data Slurp
Nov 21, 2012 | comments

A 27 year old hacker Andrew Auernheimer from new york has been found guilty of breaching AT&T's site security to obtain iPad customer data.
According to the government, the men used an
"account slurper" that was designed to match email addresses with
"integrated circuit card identifiers" for iPad
users, and which conducted a "brute...
“First 300 Shares Will Get Prize” Facebook Scam
Nov 21, 2012 | comments

Various messages distributed on Facebook claim that users can win
expensive prizes such as Apple products or designer headphones just by
liking and sharing a Facebook Page
These posts used by fraudsters to advertise their Facebook pages and, in some
cases, even utilized to trick unsuspecting customers into handing over
personal...
.Eu Domains Are Being Used To Infect PCs
Nov 20, 2012 | comments
Some malicious .eu domains have been registered during November which are being used to infect PCs with malware via the Blackhole exploit kit.
For example :
owzshm.eumpxuth.eu
ngpsjy.eu
wlwhhz.eu
jhzopj.eu
jqwwgm.eu
pmgugq.eu
jkiwhy.eu
nrxpxq.eu
vjtjpy.eu
xzjvhs.eu
xipuww.eu
kngipu.eu
ptkqzo.eu
pyrhox.eu
This type of tactic is pretty...
Smartcard Malware
Nov 20, 2012 | comments
Smartcard Malware Can Share a Smartcard Over The Internet
S8UK3FT4BKJW
Security researchers have developed proof-of-concept malware that allows
attackers to obtain remote access to smart card readers attached...
Cracking WPA2 Password Of Belkin Routers
Nov 20, 2012 | comments

A number of Belkin wireless routers are shipped with a default WPA2
password to protect network connections. The apparently random passwords
are printed on a label that’s on the bottom of the router.
Although this approach should be, in theory, more secure, because the
password is likely stronger than what many users would set themselves,
it...
Windows 8 Pro Free
Nov 20, 2012 | comments

Pirates Exploit a weakness in Microsoft’s Key Management Service (KMS) To Get Windows 8 Pro Free Copies: When a better lock’s built, folks just devise new ways to pick it. It’s
pretty much a fact of life. So it’s not surprising that folks have
already pirated Windows 8. If anything, it was probably expected. What is surprising, however,...
FreeBSD Project Server Hacked
Nov 20, 2012 | comments

Two FreeBSD Project Servers Hacked
Hackers broke into two FreeBSD project servers using an SSH authentication key* and login credentials,Venerable BSD-based operating system FreeBSD has announced a smallish system...
Malware Using Google Docs As Proxy
Nov 20, 2012 | comments

Security researchers from antivirus vendor
Symantec have uncovered a piece of malware that uses Google Docs, which
is now part of Google Drive, as a bridge when communicating with
attackers in order to hide the malicious traffic.
The malware -- a
new version from the Backdoor.Makadocs family -- uses the Google Drive
"Viewer" feature as a...
Thanksgiving Screensaver Malware
Nov 19, 2012 | comments

A malware designed to infect your PC has been found hidden inside an innocuous Thanksgiving screen-saver.When millions of Americans are preparing to celebrate Thanksgiving with their families and friends.
TheThanksgiving screensaver that you just downloaded from the net may not be entirely safe,while you are being presented with a slideshow, the...
Wii U JAILBREAK
Nov 18, 2012 | comments

Techies claim they've cracked Nintendo's anti-piracy defences in the Wii U days after the games console hit US shelves.
The hack, the gaming equivalent of jail-breaking, allows home-made
games, pirate copies of titles and other unauthorised software to run on
the Wii U, according to wiiuhacks.com. The attack appears to involve exploiting security...
Lenovo Windows 8-based home theater PC 'IdeaCentre Q190
Nov 16, 2012 | comments

Lenovo has announced the release of its new range of Windows 8-based
home entertainment desktop PC Lenovo IdeaCentre Q190. According to
Lenovo, the Q190 desktop PC is the world’s “smallest full-function” PC that measures just 22mm in width.Lenovo’s mini IdeaCentre Q190
is a spec-bumped version of the PC maker’s previous Q180 home
entertainment...
Cool Exploit Kit
Nov 16, 2012 | comments
Cyber crooks have made their attacks stealthier with the launch of a aggressive exploit kit Cool exploit kit to generate malicious code on legitimate websites. Cool can exploit multiple un-patched vulnerabilities in the user’s browsers, browser plug-ins, software applications or operating systems. Exploit kits are still making rounds,...
Email leaks 400+Taliban official's contacts
Nov 16, 2012 | comments
That was exactly the rookie mistake made by Taliban spokesman Qari Yousuf Ahmedi last week, ABC News reports, which resulted in Ahmedi inadvertently disclosing his full mailing list of more than 400 email addresses.Ahmedi is one of two official
spokesmen for the Islamic fundamentalist movement, the other being
Zabiullah Mujahid. Ahmedi...
Microsoft Surface tablet
Nov 15, 2012 | comments

Microsoft's Surface tablet, an important part of the software multinational's attempt to bring Windows into the portable computing age, is suffering from lacklustre sales, according to a report citing manufacturing sources.
Orders
from the supply chain are said to have been halved, from an estimated
4m units, which Microsoft expected to...
Cyber security
Nov 12, 2012 | comments

Five Measures for Your Cyber security
1. Translate Security Answers to Another Language
Many times, security questions such as “What is your favorite book?” are much easier to break than passwords because they are susceptible to social engineering. Consider translating your answers to another language by using free online...
How To Become a Computer Forensics Expert
Nov 9, 2012 | comments

What a Computer Forensics Investigator needs to understand
A Computer Forensics Investigator needs to be able to understand the
process of investigating a cybercrime, the laws involved and the details
in obtaining the necessary authorisation to perform the investigation.
Each computer forensics case is different, and each country’s laws are...