Logo Background

» Attacks

  • Microsoft Word Zero-Day Used In Targeted Attacks
    By on March 25, 2014 | Comments Off  Comments


    wiredmikey (1824622) writes “Microsoft warned on Monday of a remote code execution vulnerability (CVE-2014-1761) in Microsoft Word 2010 that is being actively exploited in targeted attacks. If successfully exploited, an attacker could gain the same user rights as the current user, Microsoft said, noting that users whose accounts are configured to have fewer user rights on the system could be less impacted than accounts with administrative privileges. (more…)



  • Why Laws Won’t Save Banks From DDoS Attacks
    By on April 5, 2013 | Comments Off  Comments

    kierny writes “Rep. Mike Rogers (R-Mich.) should know better. The chairman of the House Intelligence Committee claimed to told NBC News that the Operation Ababil U.S. bank disruption DDoS campaign could be stopped, if only private businesses had unfettered access to top-flight U.S. government threat intelligence. Not coincidentally, Rogers is the author of CISPA (now v2.0), a bill that would provide legal immunity for businesses that share threat (more…)

  • Verheijen attacks FAW over Speed
    By on December 21, 2012 | Comments Off  Comments

    The Football Association of Wales has “destroyed” Gary Speed’s legacy, says former assistant manager Raymond Verheijen.

    More…

  • 6 Million Virgin Mobile Users Vulnerable To Brute-Force Attacks
    By on September 20, 2012 | Comments Off  Comments

    An anonymous reader writes “‘If you are one of the six million Virgin subscribers, you are at the whim of anyone who doesn’t like you.’ The Hacker News describes how the username and password system used by Virgin Mobile to let users access their account information is inherently weak and open to abuse.” Computerworld also describes the problem: essentially, hard-coded, brute-force guessable passwords, coupled with an inadequate mechanism (more…)

  • Cyber Attacks On Activists Traced To Gamma Group’s FinFisher Spyware
    By on July 26, 2012 | Comments Off  Comments

    Sherloqq sends this quote from a Bloomberg report:
    “FinFisher, a spyware sold by U.K.- based Gamma Group, can secretly take remote control of a computer, copying files, intercepting Skype calls and logging every keystroke. For the past year, human rights advocates and virus hunters have scrutinized FinFisher, seeking to uncover potential abuses. They got a glimpse of its reach when a FinFisher sales pitch to Egyptian state security was (more…)

  • MIT Researchers Defend Against Wireless Attacks
    By on August 25, 2011 | Comments Off  Comments

    alphadogg writes “MIT researchers have devised a protocol to flummox man-in-the-middle attacks against wireless networks. The all-software solution lets wireless radios automatically pair without the use of passwords and without relying on out-of-band techniques such as infrared or video channels. Dubbed Tamper-evident pairing, or TEP, the technique is based on understanding how man-in-the-middle attacks tamper with wireless messages, and then detects (more…)

  • Chrome Feature Helps Shield Websites From DDoS Attacks
    By on April 18, 2011 | Comments Off  Comments

    An anonymous reader writes “Google has an interesting idea on how to take the edge off denial of service attacks. The latest developer builds of Chrome 12 have an option called ‘http throttling,’ which will simply deny a user access to a website once the browser has received error messages from the URL. Chrome will react with a ‘back-off interval’ that will increase the time between requests to the website. If there are enough Chrome requests flooding (more…)