Mobile malware victims may have several reactions upon discovering a smartphone infection, but chuckling is likely not one of them. Nonetheless, a new Android malware threat dubbed “HeHe” has been identified that steals text messages and intercepts and…
Energetic (Russian) Bear Attacking Western Energy Sector
Energetic Bear is the name given to a hacking group, most likely Russian, that appears to be primarily targeting the western energy sector. Although only one part of a new Global Threat Report for 2013, it is the part attracting most attention and inte…
World Economic Forum Website Faces Vulnerabilities, Just in Time for Davos
This week, economic and political movers and shakers are set to descend upon Davos, the Swiss ski resort that annually hosts what is arguably one of the most important international confabs in existence: the World Economic Forum. Unfortunately, virtual…
Tutorial On DNS Cache Poisoning (Redirect abc.com By Entering xyz.com In Address Bar)
Hello guys! Today I’m going to post about a hacking technique named “DNS Spoofing or DNS Cache Poisoning”. DNS cache poisoning is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server’s cache database, c…
Credit Card Details of 20 Million South Koreans Stolen
In a classic ‘insider’ breach, an employee of the Korea Credit Bureau (KCB) has been arrested for stealing and later selling the personal details of millions of South Koreans to phone marketing companies. The Financial Supervisory Service (FSS) has sai…
Kali Linux Amazon EC2 AMI
Kali Linux in the Amazon EC2 Marketplace
EDIT: For updated Kali Rolling images in the Amazon AWS, check this post.
After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 ma…
Judge Rules That Google Can Be Sued By Brits In British Courts
In an important ruling, Mr Justice Tugendhat has cleared the way for the group of Brits known as Safari Users Against Google’s Secret Tracking to sue Google in the the British courts. Google had argued that the case should be heard in the US. Mr Justic…
Cisco Small Biz Wi-Fi Products Remotely Vulnerable
Popular Cisco Wi-Fi routers for small and medium-sized businesses are in the cross-hairs thanks to a vulnerability that could allow an unauthenticated, remote attacker to gain root-level access to an affected device – and from there intercept informati…
Trojan Minecraft App Version Uses Smalihook to Defeat Certificate Signing
A false version of the popular Android Minecraft PE app is being sold via Russian app stores for around half the price of the official app. Since third party app stores are not generally as thorough as Google’s Play Store at finding and removing bad ap…
US-CERT Warns of NTP Amplification Attack Surge
Network Time Protocol (NTP) amplification attacks, an emerging form of distributed denial-of-service (DDoS) that relies on the use of publicly accessible servers, is starting to make the rounds, US-CERT is warning.