Archive | Exploits/Vulnerabilities




China Home to at Least HALF of Malicious Web Sites

It looks like China is becoming a hotbed for malware and malicious websites (those sites that push malware infections via browser exploits). They often used to be found in Korea and Taiwan and parts of Eastern Europe. According to the latest data more than half of the sites are now located in China. More than […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Web Hacking | Add a Comment

Virus Variant Extorts You by Encrypting Your Files

Malware authors are getting sneaky again, in the latest turn of events they have started encrypting your files and holding them at ransom! You have to pay up to get the ‘decryptor’ and get access to your files again. This is pretty dangerous…and cunning too. It’s not easily broken either, they are using RSA 1024-bit […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Spammers & Scammers | Add a Comment

Three Charged With Hacking Dave & Buster’s Chain

Another big heist in the US netting a whole lot of juicy information on credit and debit cards, over half a million USD lost in this case alone. There’s a whole lot of fraud going on.. Not bad for fiddling with the cash register system of a restaurant chain. It just shows, anyone dealing with […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking, Legal Issues, Privacy | Add a Comment

oCERT – Responsing to Flaws in Open Source Software

So a new initiative – the Open Source Computer Emergency Response Team known as oCERT has been set up one of the main sponsors being Google (read more here – Contributing to Open Source Software Security). The oCERT project is a public effort providing security handling support to Open Source projects affected by security incidents […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment

Patch Window Shrinking – Semi-Automated Reverse Engineering

As far as I know this has been happening for some time, sometimes a patch comes out for a vulnerability that many people don’t know about (including the hackers) so they will see what problem the patch fixes (possibly through reverse engineering) then develop an exploit to leverage on the flaw. It seems things are […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Programming | Add a Comment

Hackers Could Become The Hacked?

It looks like someone is going after the bad guys in a new way, by hacking them back! It’s no news to us that many hacking tools and script kiddy trojan kits are badly programmed..a lot of them have back-doors and the client-side tools have easy exploits that enable you to take over the ‘hackers’ […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware | Add a Comment

Keep on Fuzzing! Advice

As you will have noticed we’ve posted quite a number of Fuzzing Tools built around different frameworks and in different languages..most for difference targets/purposes too. Fuzzing has definitely exploded in the last year or so as more people try and understand it and code tools to automate the process. There are tools for Web Services […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Programming | Add a Comment

Spammers Harnessing Web Mail Servers – Gmail & Yahoo! Throttled

It seems like spammers are now moving to automated spam via popular web mail services as a way to bypass IP-blacklisting services. It’s a large advantage for them as they can still use botnet sources to generate the e-mail but the source IP address will be from a ‘trusted’ domain such as Gmail or Yahoo!. […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Spammers & Scammers | Add a Comment

Biometric Keylogger Can Grab Fingerprints

Well this is quite scary as biometrics are touted as the ultimate in security and two factor authentication with biometrics is about as ‘heavy’ as most places get. The fact that the biometric data can be ‘sniffed’ reconstructed and re-used…is worrying to say the least. Do any of you have biometric measures in your workplace? […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

iFrame Piggybacking on Google Searches to Install Malware

These spammers and scammers are getting rather clever, and very sneaky. This is still epedemic and seems to be happening more and more. It takes a re-write of many of the large sites online..which frankly isn’t going to happen is it? It just shows once again the spammers will think of all kinds of weird […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Spammers & Scammers, Web Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·