Tuesday, January 17, 2012

Symantec hacker to release Norton code Tuesday

This coming Tuesday behold the full Norton Antivirus 1,7Gb src, the rest will follow," Yama Tough posted via Twitter.

In the past week Yama Tough has released fragments of source code from Symantec products along with a cache of emails. The hacker says all the data was taken from Indian government servers.

for more info

Thursday, January 12, 2012

IBM Attacks The Complexity Of Security With Identity Intelligence

ARMONK, N.Y., Jan. 11, 2012 /PRNewswire/ -- IBM (NYSE: IBM) today announced a new identity intelligence breakthrough designed in IBM labs to provide corporations with a far more sophisticated approach to managing the information employees can access.

Read More

Sunday, December 04, 2011

FBI Warns of Coordinated Malware and DDoS Attacks Designed to Drain Bank Accounts

The FBI is warning the public about a cyber-crime ring that not only steals banking credentials but also launches a distributed denial of service (DDoS) attack on the victim’s financial institution as a diversion.

Read More

Wednesday, August 03, 2011

Malware hides behind DWORD formatted IP addresses

Internet users know what a domain name is, and many of them are aware of the fact that it is a "translation" of a dotted decimal IP address. But how many of them know that there are other formats that a domain name can be presented in?

This poorly known fact has occasionally been taken advantage of by cyber scammers and malware pushers, and another instance of this approach has recently been spotted by Zscaler researchers.

Read More

Monday, July 25, 2011

Apple MacBook batteries found vulnerable to malware

Researcher says Apple laptop microcontroller chips are shipped with default passwords that, once discovered, can be used as a hiding spot for malware

Read More

Thursday, July 21, 2011

How Attackers Use Search Engines and How You Can Fight Back!

We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in numerous ways. What can businesses do to fight back?

Read More