Archive | Privacy




Twitter DM Phishing Scam

As Twitter gains momentum there are more and more attacks on it, it’s users and the most recent is a phishing scam via DM (Direct Message). It was uncovered recently that it was being used as a Botnet Control Channel, shortly before that it was subjected to a DoS attack. This isn’t the first time […]

Tags: , , , , , , , , , , , , ,

Posted in: Phishing, Privacy, Spammers & Scammers | Add a Comment

Nasty Trojan Zeus Evades Antivirus Software

This is one nasty piece of malware, seems like it’s working on a low level as per rootkits, there aren’t many technical details but it may well be operating on a Ring 0 level. The level of detection by AV software is quite scary, especially since the malware is specifically targeting bank login details and […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

TJX Hacker Albert “Segvec” Gonzalez Indicted By Federal Grand Jury

We’ve been following the whole TJX saga for quite some time now since way back in September 2007 when the hack became public as the Largest Breach of Customer Data in U.S. History and in August 2008 when the TJX Credit Card Hackers Got Busted. The legal system has ticked along and now they have […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

UAE Telco Etisalat Installs Spyware On Users Blackberries

Now this is pretty disgusting behaviour from a national telco provider, but well is it really surprising in Dubai? For me..no it’s not. I’ve spent a reasonable amount of time in Dubai on various projects, and my first surprise was Flickr being blocked. Especially as Dubai is probably the most liberal place in the Middle […]

Tags: , , , , , , , , , , ,

Posted in: Legal Issues, Malware, Privacy | Add a Comment

The Middler – User Session Cloning & MITM Tool

The Middler is a Man in the Middle tool to demonstrate protocol middling attacks. Led by Jay Beale, the project involves a team of authors including InGuardians agents Justin Searle and Matt Carpenter. The Middler is intended to man in the middle, or “middle” for short, every protocol for which we can create code. In […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Privacy | Add a Comment

Ensuring Data Security During Hardware Disposal

After our recent story about the trading of BlackBerries for data theft the issue has emerged again this time more towards the secure disposal of data stored on PC hard disks. If a company or organisation has a decent data/information security policy in place (Like ISO27001 for example) they should have a secure destruction/disposal policy […]

Tags: , , , , , , , , , , , ,

Posted in: Cryptography, Hardware Hacking, Privacy | Add a Comment

Explosion Of BlackBerry Trading In Nigeria – Data Theft

The number of Crackberry Blackberry users is increasing exponentially – especially since they released the much sexier Bold and the latest touch-screen Storm. The latest revelation is that used BlackBerries are being traded, not by the value of the phone but by the value of the data contained on the phone! It just shows most […]

Tags: , , , , , , , ,

Posted in: Cryptography, Hardware Hacking, Privacy | Add a Comment

Torpig Botnet Hijacking Reveals 70GB Of Stolen Data

We did mention Torpig in passing back in January 2008 when talking about the Mebroot rootkit which digs down deep into the Master Boot Record. It seems like Torpig has been pretty active since then and the latest break is that some security researchers have managed to infiltrate the botnet and collect some data on […]

Tags: , , , , , , , , , , , ,

Posted in: Malware, Privacy, Spammers & Scammers | Add a Comment

UCSniff – VoIP/IP Video Sniffing Tool

UCSniff is an exciting new VoIP Security Assessment tool that leverages existing open source software into several useful features, allowing VoIP owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. Written in C, and initially released for Linux systems, the software is freely available for anyone to download, […]

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Privacy | Add a Comment

Indian Credit Card Fraud Exposed – Linked to Symantec

In a recent undercover sting the BBC has uncovered some unscrupulous Indian chaps selling valid UK credit card details, the kicker to the story is the fraud is linked to Symantec as the people being defrauded had all recently bought Norton subscriptions. I guess it’s hard to control a 3rd party call center though and […]

Tags: , , , , , ,

Posted in: Legal Issues, Privacy, Spammers & Scammers | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·