Researcher says Apple laptop microcontroller chips are shipped with default passwords that, once discovered, can be used as a hiding spot for malware
Read More
Monday, July 25, 2011
Thursday, July 21, 2011
How Attackers Use Search Engines and How You Can Fight Back!
We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in numerous ways. What can businesses do to fight back?
Read More
Read More
Tuesday, July 19, 2011
ATM Hacking Video - Barnaby Jack Demonstrates ATM Hacking at Black Hat USA 2010
The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! Videos of Barnaby Jack demonstrating both local and remote attacks and a multi-platform ATM rootkit
See More
See More
Microsoft posts $250K reward for Rustock botnet herders
Microsoft upped the ante on Monday in its months-long battle against the Rustock botnet by posting a $250,000 reward for information that leads to the arrest and conviction of the hackers who controlled the malware.
It was the first time Microsoft used its malware bounty program since February 2009, when it offered the same amount for the people responsible for the fast-spreading Conficker worm
Thursday, July 14, 2011
Zeus Banking Trojan Hits Android Phones
The Trojan spyware application known as Zitmo, which is designed to steal people's financial data, has now been altered to target devices running the Android mobile operating system.
Read More
Read More
Subscribe to:
Posts (Atom)