Keywords, passphrases, 25-digit alphanumeric codes, picture recognition, biometrics –authentication is a notoriously difficult thing to effect while thwarting hackers the majority of the time, given the boundaries of human memory and the rampant presen…
Hacker Nabs Downton Abbey Season Finale Script
“Guccifer,” a hacker known for lifting high-profile information from A-listers, has managed to nab the script for Downton Abbey’s season finale, while also targeting emails of various other celebrities.
SAP Combines MDM with NAC to Solve its Own Mobile Security Challenges
Mobile device management (MDM) systems are gaining rapid adoption among enterprises that wish to better manage the increasing number of smartphones and tablets being used in corporate environments.
2014: ‘The Year of Encryption?’
Will 2014 see a big uptick in the use of biometric technologies, strong encryption, a rash of new key technologies and more? Some say that the era of having unencrypted data traffic flowing freely inside enterprises will likely soon come to a crashing …
US Backdoors in French Satellites Threatens Billion Dollar Deal With the UAE
A deal for two French Falcon Eye spy satellites, where cameras can detect very small objects on the ground, is in jeopardy after the UAE buyers claimed they contain US-made parts that are considered ‘security compromising components.’
Yahoo Has Been Serving Malware To Its Users
On Friday 3 January, Dutch security firm Fox-IT detected malicious activity on some of its clients’ networks – with a common factor: they had all previously visited yahoo.com. Further investigation revealed malvertising on the Yahoo site – and it is po…
Emergency Self Destruction of LUKS in Kali
Kali Linux Full Disk Encryption
As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensi…
The Ubiquitous SD Cards can be Hacked to Deliver a MITM Attack
Two researchers, Andrew ‘bunnie’ Huang, and Sean ‘xobs’ Cross, gave a talk at the Chaos Computer Congress describing how the ubiquitous flash memory card can be used to deliver a MITM attack against its host system. The problem is that SD cards are sim…
AutoIT Surges as Malware Component
AutoIT, a flexible coding language that’s been used since 1999 for scripting in Windows, is now cropping up in next-gen malware like a Zeus variant that efficiently steals information from FTP sites and personal certificates.
Dangerous Trojan Targets World of Warcraft
Blizzard, the company behind the popular online multiplayer World of Warcraft game, has warned its gamers that a “dangerous Trojan” called Disker is being used to compromise player’s accounts, even if they are using an authenticator for protection.