Quantcast
Channel: Attacker’s – National Cyber Security
Browsing all 52 articles
Browse latest View live

David Maynor & Paul Judge, PhD – Searching for Malware: A Review of...

For many people, the first page they visit online is a search engine; in fact, in the US alone more than 14 billion searches per month happen on Google, Yahoo! and Bing. These searches are then...

View Article



Protecting your phone from attackers

Cell phones are everywhere. More than five billion cell phone subscribers exist around the world, allowing easier and more efficient communication. But that communication comes at a cost. Cell phones...

View Article

David Maynor & Paul Judge, PhD – Searching for Malware: A Review of...

For many people, the first page they visit online is a search engine; in fact, in the US alone more than 14 billion searches per month happen on Google, Yahoo! and Bing. These searches are then...

View Article

Image may be NSFW.
Clik here to view.

DDoS attackers turning to simple ‘booter’ scripts, Prolexic warns

Internet criminals are sidestepping the need to launch DDoS attack from large networks of malware-compromised bot PCs by using simpler server ‘booter shells’, mitigation firm Prolexic has warned.For...

View Article

Image may be NSFW.
Clik here to view.

M-Trends #2: Everything Old is New Again – Targeted Attackers Using Passive...

Earlier this week, I talked about malware threats. Today, we’ll address a new trend.  Turns out the perpetrators of targeted attacks are pragmatic, and are happy to borrow techniques that are even a...

View Article


Image may be NSFW.
Clik here to view.

M-Trends #6 – It Pays To Be Persistent: Financially Motivated Attackers Are...

Our sixth and final M-Trend fromFor more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View Article

Image may be NSFW.
Clik here to view.

Attackers demand ransom after encrypting medical centre’s server

Details have emerged of an extraordinary data breach incident in which a US medical practice had thousands patient records and emails encrypted by attackers who then demanded a ransom to unscramble...

View Article

Image may be NSFW.
Clik here to view.

Google ‘Aurora’ Cyber Attackers Still in Business

A group of cyber-scammers who were possibly behind the 2010 attack on Google infrastructure are still operational and now using more sophisticated tools, according to a new report from Symantec.For...

View Article


Image may be NSFW.
Clik here to view.

Proof-of-concept malware gives attackers control of USB smart card readers

A team of researchers have created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.For more...

View Article


Image may be NSFW.
Clik here to view.

Attackers hijack the Romanian domains of Google, Microsoft, Yahoo, others

The Romanian domain names of Google, Yahoo, Microsoft, Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands. View full post onFor more...

View Article

Image may be NSFW.
Clik here to view.

PayPal attackers jailed in U.K., U.S. cases trudge along

Attorneys and prosecutors are scheduled to meet next week in San Jose, Calif. to discuss the cases against the so-called “PayPal 14,” accused of participating in DDoS attacks against PayPal.For more...

View Article

Image may be NSFW.
Clik here to view.

Browser-hijacking Trojan talks to attackers using SPF email validation protocol

A new Trojan program that displays rogue advertisements during browsing sessions uses a DNS-based email validation protocol called the Sender Policy Framework (SPF) in order to receive instructions...

View Article

Image may be NSFW.
Clik here to view.

Report on China spy threat may make attackers have to work harder

Security firm Mandiant may have documented among the most convincing evidence to date of the significant espionage threat emanating from China. View full post onFor more information go to...

View Article


Image may be NSFW.
Clik here to view.

Attackers exploit yet another Java flaw

A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye.For...

View Article

Image may be NSFW.
Clik here to view.

DoD creating cyber “offensive” teams to strike back against foreign attackers

Cyber Command Chief Gen. Keith Alexander is now assembling 13 teams of IT experts for this purpose. View full post on Latest articles from SC Magazine NewsFor more information go to...

View Article


Image may be NSFW.
Clik here to view.

If You Use Adobe Change Your Password: Hackers Stole Info On At Least 38...

  Earlier this month, Adobe revealed that hackers broke into its computer systems and walked away with stolen user names, passwords and credit cards.   It said 2.9 million customers were affected, in...

View Article

Image may be NSFW.
Clik here to view.

Hackers broke into poker pro’s hotel room to install ‘sharking’ malware

This September, on the Barcelona leg of the European Poker Tour, Jens Kyllönen had a strange run-in with the the criminal underworld. He had busted out of that day’s tournament early, but when he...

View Article


David Maynor & Paul Judge, PhD – Searching for Malware: A Review of...

Source: National Cyber Security - Produced By Gregory Evans For many people, the first page they visit online is a search engine; in fact, in the US alone more than 14 billion searches per month happen...

View Article

Image may be NSFW.
Clik here to view.

Protecting your phone from attackers

Cell phones are everywhere. More than five billion cell phone subscribers exist around the world, allowing easier and more efficient communication. But that communication comes at a cost. Cell phones...

View Article

Image may be NSFW.
Clik here to view.

DDoS attackers turning to simple ‘booter’ scripts, Prolexic warns

Internet criminals are sidestepping the need to launch DDoS attack from large networks of malware-compromised bot PCs by using simpler server ‘booter shells’, mitigation firm Prolexic has warned....

View Article
Browsing all 52 articles
Browse latest View live




Latest Images