Archive | May, 2006


25 May 2006 | 5,815 views

South-East Asia Vulnerable to Cyber Terrorism

Interesting to see this just a little while after Malaysia announced IMPACT, it’s anti cyber-terrorist task force.. IMPACT is its name, and making an impact in the battle against cyber-terrorism is its mission. Unveiled in Austin, Texas, the Malaysian initiative seeks to bring together governments and the international private sector to deal with increasing threats [...]

Continue Reading


25 May 2006 | 7,214 views

Carders Scamming Spammers!

Sounds complicated, it’s almost a tongue-twister. It turns out the carders (people using stolen credit card details fraudulently) have worked out how to get money out of the spammers (spamming being massive nowdays) Fraudsters who deal in stolen credit card data have devised a means to extract money from sponsors of junk mail campaigns. Carders [...]

Continue Reading


24 May 2006 | 3,796 views

Security Researchers Afraid to Reveal Vulnerabilities

Well it happened a while back, remember? The French researcher Guillaume Tena who got in trouble for breaching French copywrite laws by decompiling some software. Now people are generally starting to worry about disclosing vulnerabilities through any channels, does there need to be some kind of anonymous PGP key based system for vulnerability disclosure? So [...]

Continue Reading


23 May 2006 | 23,064 views

hackers playground… windows?

Only as I am writing these lines I can imagine some people who will start laughing when reading this article… But my dear friends this may be the real thing… will see who will laugh 10 years from now… I. Introduction This article was ment to be, because, as you will notice, more and more [...]

Continue Reading


23 May 2006 | 3,416 views

Ohio University Compromised for Over a Year!

A year? A whole year? A few days I can take, but surely if an Admin doesn’t know what’s going with his machines for a year….compromised for a year, there is something wrong. An unprecedented string of electronic intrusions has prompted Ohio University to place at least one technician on paid administrative leave and begin [...]

Continue Reading


23 May 2006 | 3,374 views

Trojan for the Word Vulnerability in the Wild

We all knew it was just a matter of time until the ‘thing’ was out. PandaLabs has detected the appearance of 1Table.A, a malicious code that exploits a recently detected critical vulnerability in Microsoft Word, and which also affects versions of MS Office 2003 and XP. Microsoft confirmed today the existence of this vulnerability and [...]

Continue Reading


22 May 2006 | 6,413 views

PBNJ 1.14 Released – Diff Your Nmap Results

PBNJ is a network tool that can be used to give an overview of an machine or multiple machines by identifying the details about the services running on them. PBNJ is different from other tools because it is based on using a scan from nmap parsed to amap. PBNJ parses the data from a scan [...]

Continue Reading


22 May 2006 | 6,809 views

The Ultimate Net Monitoring Tool – Semantic Traffic Analyzer

Packet sniffing goes hi-tech? What’s wrong with ethereal? The equipment that technician Mark Klein learned was installed in the National Security Agency’s “secret room” inside AT&T’s San Francisco switching office isn’t some sinister Big Brother box designed solely to help governments eavesdrop on citizens’ internet communications. Rather, it’s a powerful commercial network-analysis product with all [...]

Continue Reading


21 May 2006 | 7,722 views

What Next? The Poker Rootkit of Course!

Ok so the list gets even BIGGER, after the WoW Trojan, Trojan for World Cup Fans, Ransomeware and the buy a spyware kit story… Now we proudly present, the Poker Rootkit! For online poker players, this was always going to be a losing hand. A Trojan with malicious rootkit features hidden in a legitimate software [...]

Continue Reading


20 May 2006 | 14,850 views

The Biggest Web Defacement Ever

A Turkish hacker using the handle iSKORPiTX was able to breach the security of a group of web servers, containing more than 38.500 web sites in less than a day! Iskorpitx is believed to be 45 years old, sometimes being helped for minor defacement activities by another Turkish “senior cracker” (42) going by the handle [...]

Continue Reading