This coming Tuesday behold the full Norton Antivirus 1,7Gb src, the rest will follow," Yama Tough posted via Twitter.
In the past week Yama Tough has released fragments of source code from Symantec products along with a cache of emails. The hacker says all the data was taken from Indian government servers.
for more info
Ehab Abu Al Khair Blog
Watching IT security News like a Hawk
Tuesday, January 17, 2012
Thursday, January 12, 2012
IBM Attacks The Complexity Of Security With Identity Intelligence
ARMONK, N.Y., Jan. 11, 2012 /PRNewswire/ -- IBM (NYSE: IBM) today announced a new identity intelligence breakthrough designed in IBM labs to provide corporations with a far more sophisticated approach to managing the information employees can access.
Read More
Read More
Sunday, December 04, 2011
FBI Warns of Coordinated Malware and DDoS Attacks Designed to Drain Bank Accounts
The FBI is warning the public about a cyber-crime ring that not only steals banking credentials but also launches a distributed denial of service (DDoS) attack on the victim’s financial institution as a diversion.
Read More
Read More
Monday, August 15, 2011
Wednesday, August 03, 2011
Malware hides behind DWORD formatted IP addresses
Internet users know what a domain name is, and many of them are aware of the fact that it is a "translation" of a dotted decimal IP address. But how many of them know that there are other formats that a domain name can be presented in?
This poorly known fact has occasionally been taken advantage of by cyber scammers and malware pushers, and another instance of this approach has recently been spotted by Zscaler researchers.
Read More
This poorly known fact has occasionally been taken advantage of by cyber scammers and malware pushers, and another instance of this approach has recently been spotted by Zscaler researchers.
Read More
Monday, July 25, 2011
Apple MacBook batteries found vulnerable to malware
Researcher says Apple laptop microcontroller chips are shipped with default passwords that, once discovered, can be used as a hiding spot for malware
Read More
Read More
Thursday, July 21, 2011
How Attackers Use Search Engines and How You Can Fight Back!
We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in numerous ways. What can businesses do to fight back?
Read More
Read More
Subscribe to:
Posts (Atom)