Emergency Self Destruction of LUKS in Kali

Kali Linux Full Disk Encryption
As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensi…

January 6, 2014
Read More >>

AutoIT Surges as Malware Component

AutoIT, a flexible coding language that’s been used since 1999 for scripting in Windows, is now cropping up in next-gen malware like a Zeus variant that efficiently steals information from FTP sites and personal certificates.

January 4, 2014
Read More >>

Dangerous Trojan Targets World of Warcraft

Blizzard, the company behind the popular online multiplayer World of Warcraft game, has warned its gamers that a “dangerous Trojan” called Disker is being used to compromise player’s accounts, even if they are using an authenticator for protection.

January 4, 2014
Read More >>

Boston Restaurant Group Hit by Data Breach

Customers at eight Boston-area dining establishments owned by the Briar Group may have had their credit and debit card data stolen. The mix of restaurants and Irish-style pubs are popular around the metro area, and include Anthem, City Bar, City Table,…

January 3, 2014
Read More >>

Syrian Electronic Army Hacks Skype – Allegedly

Reports have emerged this morning about a short-lived hack of Skype’s Twitter and WordPress accounts by the Syrian Electronic Army. No evidence of the hack remains, although screenshots purportedly demonstrate that it happened. Unusually, it is in prot…

January 2, 2014
Read More >>