Skip to main content

Security

New SMB Relay Attack Steals User Credentials Over Internet

posted onAugust 6, 2015
by l33tdawg
Credit:

A Windows vulnerability in the SMB file-sharing protocol  discovered 14 years ago and partially patched by Microsoft could still be abused via remote attacks, two security researchers demonstrated on stage at the Black Hat security conference on Wednesday.

Inside the $100M ‘Business Club’ Crime Gang

posted onAugust 6, 2015
by l33tdawg

New research into a notorious Eastern European organized cybercrime gang accused of stealing more than $100 million from banks and businesses worldwide provides an unprecedented, behind-the-scenes look at an exclusive “business club” that dabbled in cyber espionage and worked closely with phantom Chinese firms on Russia’s far eastern border.

We Spoke to the Hackers Who Defaced Donald Trump’s Website

posted onAugust 5, 2015
by l33tdawg
Credit:

Telecomix is a hacktivist group of loosely connected individuals who are primarily known for bringing clean lines of communication to war torn areas where information is suppressed. In their own parlance, the group's guiding principle is "datalove," meaning they want to spread information far and wide while actively preventing it from being needlessly repressed.

Hackers turn Square hardware into device to steal old credit card information

posted onAugust 5, 2015
by l33tdawg
Credit:

Just because the Square Reader is new doesn't mean it isn't susceptible to the same scams as old school ATMs and credit card readers.

Three recent Boston University graduates are preparing to publicly present research that demonstrates how to hack Square's mobile payments hardware. The research is set to be shown off at the The Black Hat Security conference in Las Vegas this week.

Maker of hacked radio says system is unique to Fiat Chrysler

posted onAugust 5, 2015
by l33tdawg
Credit:

The company that makes car radios that friendly hackers exploited to take control of a Jeep Cherokee says its other infotainment systems don't have the same security flaw.

Harman International CEO Dinesh Paliwal said Tuesday that the hackers used a cellular connection to get to the radio, which they used to control critical functions such as brakes and steering.

Hacker was able to take complete control of a computer running Popcorn Time

posted onAugust 5, 2015
by l33tdawg
Credit:

Popcorn Time, the Netflix-like website for pirated movie content, may be vulnerable to a hack attack, TorrentFreak reports. This is according to a Greek security researcher named Antonios Chariton who published a blog post this past weekend.

Using a series of techniques, Chariton wrote that he demonstrated how “someone can get complete control of a computer assuming they have a Man In The Middle position in the network.”

Mobile batteries become prime target for hackers

posted onAugust 4, 2015
by l33tdawg
Credit:

 Batteries have become a new security risk for smartphone users, with a group of security researchers saying they are able to transmit personal data to hackers.

Lukasz Olejnik, Gunes Acar, Claude Castelluccia and Claudia Diaz have written a paper outlining the risks, saying a piece of software used in the HTML5 web language transmits data such as how much power is still left in a battery so websites using the code can save power while browsing.

U.S. Reportedly Considers Retaliating Against Cyberattacks From China

posted onAugust 3, 2015
by l33tdawg
Credit:

Last month the U.S. Office of Personnel Management was hit by a drastic cyberattack which resulted in personal information of millions of current and former U.S. government employees to be stolen. While the Obama administration has refrained from pointing fingers it’s believed that the attack originated from China, a new report claims that the administration is mulling a possible retaliation against the People’s Republic.