Monday, July 25, 2011

Apple MacBook batteries found vulnerable to malware

Researcher says Apple laptop microcontroller chips are shipped with default passwords that, once discovered, can be used as a hiding spot for malware

Read More

Thursday, July 21, 2011

How Attackers Use Search Engines and How You Can Fight Back!

We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in numerous ways. What can businesses do to fight back?

Read More

Tuesday, July 19, 2011

ATM Hacking Video - Barnaby Jack Demonstrates ATM Hacking at Black Hat USA 2010

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! Videos of Barnaby Jack demonstrating both local and remote attacks and a multi-platform ATM rootkit

See More

Microsoft posts $250K reward for Rustock botnet herders

Microsoft upped the ante on Monday in its months-long battle against the Rustock botnet by posting a $250,000 reward for information that leads to the arrest and conviction of the hackers who controlled the malware.

It was the first time Microsoft used its malware bounty program since February 2009, when it offered the same amount for the people responsible for the fast-spreading Conficker worm


ReadMore

Thursday, July 14, 2011

Zeus Banking Trojan Hits Android Phones

The Trojan spyware application known as Zitmo, which is designed to steal people's financial data, has now been altered to target devices running the Android mobile operating system.

Read More