The hacker known as Guccifer, who makes a habit of hacking the rich and powerful – the ‘Illuminati’ in his own terms – has struck again, this time forcing former US Secretary of State Colin Powell to deny an affair.
Rodecap – a New Spam Bot in Town
Just over a week ago Symantec published a note on a new spam bot that it was and is currently investigating. A Swiss researcher, however, was already on it, having trapped the first instance in his sandnet two days earlier.
Comfoo – the APT RAT that Ratted on RSA
The Comfoo trojan has been in continuous development since at least 2006. It has more than 200 variants and has been used in at least 64 different campaigns, including the RSA SecurID breach in 2010 – but little has been known about it.
Black Hat 2013: Researchers Demo How Smart TVs Can Watch You
Two different presentations at Black Hat Las Vegas on August 2nd 2013 called new attention to the risks posed by smart TVs increasingly found in homes and offices around the world. Researchers demonstrated how vulnerabilities in these systems can be us…
BSides Las Vegas: How to Find Fame as an Information Security Professional
Self-promotion through social media is the key to improving your visibility in the information security industry Javvad Malik told an engaged audience at BSides Las Vegas on August 1st 2013.
VERIS: A New Database for Sharing Security Incident Information
A new community database has been launched by Verizon to help bridge the uncertainty gap in data breach information: what we know and what we need to know. Based on VERIS, it is designed to facilitate the secure sharing of incident information for the …
XKeyscore – the Front End that Queries the NSA Databases
The Guardian has released the latest of its Edward Snowden leaks – NSA training material for a system called XKeyscore that allows analysts to search through vast databases of emails, online chats and browsing histories.
Black Hat 2013: Responsible Disclosure on Increase through Bug Bounty Program
Responsible zero-day vulnerability disclosure is on the increase, according to Brian Gorenc, manager of HP’s Zero Day Initiative.
What is the Syrian Electronic Army?
As the Syrian Electronic Army (SEA) continues its hacking spree across largely Western organizations, it is worth pausing to question: what is the SEA, how does it operate, and what are its motivations?
83% of Mobile Apps Exhibit Risky Behavior
iOS apps are worse than Android apps, and free apps are worse than paid apps – but in a study that has implications for both personal and BYOD use, as many as 83% of all apps exhibit at least one form of risky behavior.