A que famosos se parecen tus amigos? (Celebrity photo match for your friends)
It sounds like a fun application – scanning your friends profile photos and then matching them with the celbrity that they most closely resemble. If only it actually worked… It starts with a friend’s...
View ArticleWhat is i^i?
What is ii? That's easy enough to figure out. What's slightly more difficult to understand is why I get asked questions like this. Something about giving answers, I suppose. In any event, for any...
View ArticleIBM: One Bit, Twelve Atoms
via the IBM Almaden Research Center located in San Jose, California comes atomic scale data storage, with the resultant 1 bit of data, residing within a 12 atom construct. The research team, comprised...
View ArticleNitrozac and Snaggy: Cry Havoc
via the Sarcastic Genius of Nitrozac and Snaggy at The Joy of Tech™
View Article[Honeypot Alert] phpMyAdmin Superglobal Session Manipulation Attack Detected
Our web honeypots have identified attempts to exploit CVE-2011-2505. OSVDB lists the vulnerabilty as - phpMyAdmin libraries/auth/swekey/swekey.auth.lib.php Swekey_login() Function Superglobal Session...
View ArticleFlashback to 2011: another recurring Trojan…
…not to mention more XProtect updates. While the tussle between Apple (trying to keep their minimal antivirus utility up-to-date with a current threat) and the people behind OSX/Flashback (releasing...
View ArticleEffective password testing using Metasploit
Software vulnerabilities receive most of the limelight in network security, but weak, shared, and mismanaged passwords are often the biggest threat to most organizations.
View ArticleF-Secure’s summary of 2011 Mac Malware
F-Secure have published details of the OS X malware the company has been tracking in the last three quarters of 2011. Fifty-eight instances, according to the blog post at Mac Malware Summary 2011...
View Article2012 Has Delivered Her First Giant Data Breach
This weekend, Amazon’s Zappos.com revealed that they had fallen victim to a massive data breach that exposed the personal information of 24 million customers. It’s the same story we’ve heard over and...
View ArticleFree PureCloud Scan for Five IPs in Spiceworks
We've got a great promotion in Spiceworks. Scan up to five IPs with nCircle PureCloud and get complete vulnerability reports, a $225 value. You can ind more information here. But hurry, this offer is...
View ArticleSBN Sponsor Post
Register for RSA Conference US by January 27, 2012 and save $400.http://bit.ly/mRTeE4
View ArticleAndroid – meet NSA/SELinux lockdown
National Security Agency’s (NSA) SE Linux team, citing “critical gaps in the security of Android”, is building a Security Enhanced (SE) version of the publicly available source code for the Android...
View ArticleIsraeli hackers respond
An Israeli hacker group, IDF-Team (not to be confused with the actual Israeli Defense Force), responded to recent hacks of El-Al and the Tel Aviv Stock Exchange by returning the favour to the Saudi...
View ArticleEvolution of online attacks mirrors the history of advertising
Similarities continue as we see more targeted, personalized attacks
View ArticleMonitoring pastebin.com within your SIEM
(Source: pastebin.com) For those who (still) don’t know pastebin.com, it’s a website mainly for developers. Its purpose is very simple: You can “paste” text on the website to share it with other...
View ArticleAll Out Cyber War – A brief analysis of the middle-eastern cyber conflict
It's all out cyber-war, and everyone is at war with everyone else if you read the headlines. Israel, Saudi Arabia, and a whole host of countries are getting into what is a very dangerous dance all...
View Article‘MegaSearch’ Aims to Index Fraud Site Wares
A new service in the cyber underground aims to be the Google search of underground Web sites, connecting buyers to a vast sea of shops that offer an array of dodgy goods and services, from stolen...
View ArticleKeep your ATM Pin Secret and use SMS transaction alerts
Many of us may share our ATM pin with a close family membe,r but when we expand the community to include drivers, close friends, strangers who we ask for assistance at ATM kiosks, and even write the...
View ArticleCarberp Steals e-cash Vouchers from Facebook Users
Recently, we came across a new configuration of the Carberp Trojan that targets Facebook users to commit financial fraud. Unlike previous Facebook attacks designed to steal user credentials from the...
View Article