securityweek.com
Blackhole Exploit - A Business Savvy Cyber Gang Driving a Massive Wave of Fraud | SecurityWeek.Com
http://www.securityweek.com/black-hole-exploit-business-savvy-cyber-gang-driving-massive-wave-fraud
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Blackhole Exploit - A Business Savvy Cyber Gang Driving a Massive Wave of Fraud. On May 16, 2012. Tucked away in a small town outside Moscow, Russia one of the world’s most prolific and effective cybercriminals works away on the next version of malicious software that will enable the theft of millions of dollars from unsuspecting victims around the world. Going by the online moniker of Paunch. Not an easy case to make.
securityweek.com
New Attack on RC4-Based SSL/TLS Leverages 13-Year-Old Vulnerability | SecurityWeek.Com
http://www.securityweek.com/new-attack-rc4-based-ssltls-leverages-13-year-old-vulnerability
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. New Attack on RC4-Based SSL/TLS Leverages 13-Year-Old Vulnerability. On March 26, 2015. Researchers at Imperva’s Application Defense Center have found a way to leverage a 13-year-old vulnerability in the RC4 cryptographic algorithm to recover partial information from SSL/TLS-protected communications. Has been in the shadows in the past 13 years, according to researchers. Is similar to BEAST. In an attack scenario descr...
securityweek.com
Foray Into US Life Led Hacker Couple to Crack Smart Rifle | SecurityWeek.Com
http://www.securityweek.com/foray-us-life-led-hacker-couple-crack-smart-rifle
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Foray Into US Life Led Hacker Couple to Crack Smart Rifle. On August 07, 2015. Las Vegas - A dive into a gun-loving side of US culture by a pair of computer security researchers led them to hack into a digitally-enhanced sniper rifle. Runa is from Norway with a romanticized vision of the United States, loving all things American," Auger said as he and his wife discussed their findings at Black Hat. Squeezing the trigge...
securityweek.com
Attackers Used Multiple Zero-Days to Hit Spy Agencies in Cyber-Espionage Campaign | SecurityWeek.Com
http://www.securityweek.com/attackers-used-multiple-zero-days-hit-spy-agencies-cyber-espionage-campaign
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Rsaquo; Risk Management. Attackers Used Multiple Zero-Days to Hit Spy Agencies in Cyber-Espionage Campaign. By Fahmida Y. Rashid. On August 07, 2014. Kaspersky Lab said that it has discovered how victims of an ongoing massive cyber espionage campaign were infected, shedding light on questions previously left unanswered in earlier research. The campaign, called Epic Turla. Turla, also known as Snake. New research indica...
securityweek.com
Zscaler Launches Cloud-Based Firewall | SecurityWeek.Com
http://www.securityweek.com/zscaler-launches-cloud-based-firewall
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Rsaquo; Network Security. Zscaler Launches Cloud-Based Firewall. On April 14, 2015. San Jose, California-based Zscaler, a provider of cloud-based security solutions, unveiled a new cloud-based next-generation firewall that provides network security, application control and visibility from any location, with no on-premise hardware or software required. Designed to be deployed i. Offers key features including:. Our new N...
securityweek.com
How Hackers Target Cloud Services for Bitcoin Profit | SecurityWeek.Com
http://www.securityweek.com/how-hackers-target-cloud-services-bitcoin-profit
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Rsaquo; Cloud Security. How Hackers Target Cloud Services for Bitcoin Profit. By Fahmida Y. Rashid. On March 06, 2014. While Bitcoin is growing in popularity, driven partially by frequent shifts in its value, the cyber-currency remains difficult to obtain. Cyber-criminals are increasingly crafting campaigns to steal computing resources to generate more Bitcoin. It is not generally economically viable to mine Bitcoin if...
securityweek.com
FREAK Vulnerability Exposes SSL/TLS Security Hole | SecurityWeek.Com
http://www.securityweek.com/freak-vulnerability-exposes-ssltls-security-hole
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Rsaquo; Network Security. FREAK Vulnerability Exposes SSL/TLS Security Hole. On March 04, 2015. Researchers have released details of a vulnerability (CVE-2015-0204) that makes it possible for hackers to crack HTTPS-protected traffic by forcing vulnerable clients to downgrade to weaker crypto. The vulnerability has been dubbed 'FREAK' for Factoring RSA Export Keys. It was discovered by a group. Thus, if a server is will...
securityweek.com
Feedback Friday: Industry Reactions to VENOM Vulnerability | SecurityWeek.Com
http://www.securityweek.com/feedback-friday-industry-reactions-venom-vulnerability
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Feedback Friday: Industry Reactions to VENOM Vulnerability. On May 15, 2015. Crowdstrike disclosed this week the existence of VENOM. A serious vulnerability affecting many virtualized environments. An attacker with a root level account on the system can exploit the vulnerability (CVE-2015-3456). To escape the virtual machine and execute arbitrary code on the host. And the feedback begins. VENOM represents hackers hacki...
securityweek.com
Why Teaching Kids to Hack is a Good Thing | SecurityWeek.Com
http://www.securityweek.com/why-teaching-kids-hack-good-thing
ICS Cyber Security Conference. Fraud and Identity Theft. Tracking and Law Enforcement. Rsaquo; Network Security. Why Teaching Kids to Hack is a Good Thing. On July 23, 2012. The More We Understand About How the Bad Guys Operate, The Better off We Will Be. I recently had the opportunity to visit Singapore and speak at a variety of IT security events, both big and small, on the subject of modern malware. A hacker’s mentality is needed in order to provide good security. When the next great product, app ...
SOCIAL ENGAGEMENT