It appears that the scammers had added new pages with randomly-generated filenames inside the /wp-includes/ directory on the sites.
Read more, a MUST:
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
Scoop.it!
It appears that the scammers had added new pages with randomly-generated filenames inside the /wp-includes/ directory on the sites.
Read more, a MUST:
No comment yet.
Sign up to comment
Scoop.it!
Anonymous has leaked VMware’s ESX Server kernel source code online, and the veracity of the claim has been confirmed on the company's Security and Compliance blog.
Finally, a number of high and low profile sites have also been hacked and defaced: NBC, Saturday Night Live, a Lady Gaga fan site (all purportedly by a hacker that goes by the handle of Pyknic), the Ghana Consulate, Arcelor Mittal, and others.
Read more, a MUST: http://www.net-security.org/secworld.php?id=13900
Scoop.it!
The hacks are apparently just the beginning of document dumps and defacements for its day of protest, the 5th of November, aka Guy Fawkes Day. Read this article by Violet Blue on CNET News.
Read more, a MUST: http://news.cnet.com/8301-1023_3-57544908-93/anonymous-hacking-spree-hits-paypal-symantec/
Scoop.it!
More than 100,000 Android applications in Google Play are considered "suspicious" or "questionable," according to new research.
Read more: http://mashable.com/2012/11/05/android-apps-suspicious/
Scoop.it!
Apple released its first security updates to iOS 6. Version 6.0.1 includes patches for critical vulnerabilities in the operating system kernel, Passcode Lock and WebKit.
Read more: http://threatpost.com/en_us/blogs/apple-patches-kernel-passcode-lock-and-webkit-flaws-ios-601-110212
Scoop.it!
"Waging war" on Russia, hacktivist collective GhostShell have released 2.5 million records stolen from the Russian government.
Scoop.it!
Digital viruses can play havoc with your business' computer network.
Digital viruses can play havoc with your business’ computer network. Businesses, especially small and medium enterprises, can’t afford to ignore system security. Today’s infographic compares the most debilitating digital viruses to some of the deadliest human viruses of all time.
=========================================== Gust MEES
Check out also my FREE courses where YOU learn how to protect yourself and others at its best:
- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/
- http://gustmeesfr.wordpress.com/2012/01/02/securite-pc-et-internetsecurite-sites-internet/
===========================================
Read more, a MUST: http://www.saleschase.com/blog/2012/06/06/deadly-viruses-small-businesses-wary-of/
Scoop.it!
Two security vulnerabilities in Safari are being addressed in an update of the browser software released by Apple earlier today. This update coincides with Apple’s iOS 6.0.1 software update, which addressed multiple security problems. The 48.5 MB update to Safari 6.0.2 is available for OS X Lion and OS X Mountain Lion, and is recommended as it fixes security flaws in the software.
===> UPDATE asap!!! <===
Read more, a MUST: http://www.intego.com/mac-security-blog/safari-update-fixes-security-flaws/
Scoop.it!
Company bolsters anti-hacker defences...
Apple has released an update for its Safari web browser designed to fix a number of security flaws.
Read more, a MUST:
Via Gust MEES
Scoop.it!
Two weeks ago, Mac security software company Intego discovered malware which it classified as "a new Java backdoor trojan called Java/Jacksbot.A.” New threats are discovered all the time, but Intego later concluded that even though Jacksbot is a variant of the Java remote access tool (RAT) created by the jailbreaking group Redpois0n, it can target multiple platforms.
The malware writers behind JACKSBOT may just be testing the waters for a successful multiplatform malware; however for now they appear to be unwilling to invest the time and resources to develop the code more completely.
===> It’s likely that the authors will continue to improve the code to fully support infection for OS X and Linux. <===
Read more, a MUST:
Scoop.it!
While there is growing support for international cybersecurity exercises, more can be done to ensure such exercises are successful, according to a report published Oct. 25 by the European Network and Information Security Agency (ENISA).
Read more, a MUST:
Scoop.it!
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.
It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.
============================================
Gust MEES
Check out also my curation and my FREE course about it:
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
- http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD
- http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD
============================================
Read more, a MUST: http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/
Scoop.it!
Drives & Controls :: News :: World news :: More than 500,000 control devices are vulnerable to Internet attacks...
More than 500,000 control devices are vulnerable to Internet attacks
Cyber-security researchers have found more than 500,000 control devices with direct connections to the Internet that could be used to attack them and the systems they control. The unnamed researchers have reported their findings to the US Government’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).
The researchers found the potentially vulnerable systems using the Shodan search engine and searching for control-systems-related terms such as Scada (supervisory control and data acquisition). The researchers are worried that cyber-attackers could use the search engine in a similar way as a shortcut to finding vulnerable control systems and thus threaten or attack critical infrastructure.
Read more: http://www.drives.co.uk/fullstory.asp?id=3659
|
Scoop.it!
L'éditeur de logiciel de sécurité Kaspersky a publié quelques statistiques sur les failles de sécurité découvertes dans le monde au troisième trimestre. Pour délivrer ces chiffres, Kaspersky s'appuie sur la base d'utilisateurs de ses produits.
On trouve ensuite des logiciels d'Adobe (Flash, Adobe Reader et Shockwave) qui est le plus représenté dans ce top 10 avec cinq mentions. Apple est également présent avec des failles concernant QuickTime (14 % des utilisateurs concernés) et iTunes (12 %). Nullsoft avec Winamp ferme la marche.
En savoir plus :
http://www.macg.co/news/voir/257709/vulnerabilites-kaspersky-pointe-adobe-oracle-et-apple
Scoop.it!
As it becomes the 5th of November around the world, Anonymous announced a hacking spree that has claimed many websites and a few databases - plus a planned V For Vendetta reenactment at the Houses of Parliament.
Read more, a MUST: http://www.zdnet.com/paypal-symantec-hacked-as-anonymous-begins-november-5-hacking-spree-7000006876/
Scoop.it!
European Commission - Press Release - European Commission Neelie Kroes Vice-President of the European Commission responsible for the Digital Agenda Information Security Forum Conference, Chicago 4th November 2012 Every day, people worldwide rely...
===> Cyber-security should be recognised as a top political priority. <===
Here in the US it has long obtained political attention. It is time we do the same in Europe and worldwide.
Read more, a MUST: http://europa.eu/rapid/press-release_SPEECH-12-774_en.htm?locale=en
Scoop.it!
Anonymous hacker "pyknic" has hacked into several NBC websites, with the message "Remember, remember the fifth of November."...
Read more: http://mashable.com/2012/11/04/nbc-hacked/
Scoop.it!
The company says the apps demand a 'suspicious' number of high-risk permissions.
According to a new report from Bit9, more than 100,000 Android apps in the Google Play store (25 percent of more than 400,000 apps studied) pose a security risk to users.
Read more:
Scoop.it!
Le département des impôts & taxes de la Caroline du sud a été victime d’une attaque massive qui a conduit au vol de millions de numéros de sécurité sociale et de centaines de milliers de numéros de cartes bancaires.
En savoir plus :
Scoop.it!
In February 2012, the incidence of malware infections on the 25,000 most popular websites was studied. Some of the findings are interesting.
Highlights of the infographic:
1. Over 10 million people would have been served with malicious software in the month that the survey was done, i.e February 2012.
2. United States hosted around half of all infected websites. The Netherlands came in second at 19%.
3. 54% of the infected websites are more than 5 years old; 43% of the websites were between 1 and 5 years
4. Free-tv-video-online.me, bigresource.com and myplaycity.com are the top 3 infected sites as per Alexa Site Ranking
===========================================
Gust MEES
Check out also my FREE courses where YOU learn how to protect yourself and others at its best:
- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/
- http://gustmeesfr.wordpress.com/2012/01/02/securite-pc-et-internetsecurite-sites-internet/
===========================================
Read more, a MUST: http://www.saleschase.com/blog/2012/07/01/how-to-protect-your-system-from-bad-websites/
Scoop.it!
From
mcaf
Misconfigured Apache sites expose user passwords, other private data System status pages are publicly viewable on thousands of sites.
Read more, a MUST:
Scoop.it!
Cybercriminals Continue to Improve Skype-Spreading Malware...
At the beginning of October, cybercriminals started spreading some nasty pieces of malware via Skype by using messages such as “lol is this your new profile pic” to trick users into clicking on malicious links.
According to security firms, millions of users might have infected their computers after clicking on the suspicious links. Although the infection rates have dropped since, security researchers say that the individuals responsible for developing and maintaining the threats known as W32.IRCBot.NG and W32.Phopifas haven’t given up on their project.
The infection routine remains unchanged, but the developers have added new hosts from which the pieces of malware can be downloaded, Symantec experts explain.
Read more, a MUST:
Scoop.it!
With more than 2 Million home computers infected, the ZeroAccess Botnet Generates roughly $1 Million in Ad Click fraud daily for cybercriminals.
A report from network-based security and analytics vendor Kindsight says that 2.2 million home networks were infected with the ZeroAccess botnet in Q3 2012. This infection rate means that advertisers are losing almost one million dollars a day due to click fraud generated by the botnet, the report adds.
ZeroAccess has been around since 2010, and is a business in and of itself. In September, it was estimated that the size of the botnet had grown to one million systems and had been installed over 9 million times globally, with the majority of these infection and installation points located within the U.S.
Read more, a MUST:
Scoop.it!
The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).
After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20% from last year, and that cybercrime impacted just under ½ of them in the previous 12 months.
Read more, a MUST:
Scoop.it!
“The Russian shadow economy is an economy of scale, one that is service oriented and that has become a kleptocracy wherein crony capitalism has obtained a new lease on life in cyberspace,” says a new report into the cybercriminal Russian underground.
Professor John Walker, chair of the London chapter ISACA and CTO of Secure-Bastion, sees a road-map for APT laid out by the report. “In a nutshell,” he told Infosecurity, “what the Trend Micro report is confirming is that the much debated logical attack vectors of
===> the Advanced Persistent Threat (APT), and the more focused Advanced Evasion Techniques (AET) as reported by StoneSoft are not hype, but reality.<===
“In the Trend Micro report,” he continued, “we see the imagination of the Russian Cyber Attacker laid out before our eyes – with some excellent examples of the lengths cyber criminals are prepared to take to underpin a successful mission.
===> It is also very clear that, this mission is lucrative, and would seem to imply it is going to be with us for some time yet.” <===
Read more, a MUST:
|