SiteCheck – Got Blackhat SEO Spam Warning?
As of late it seems like we’re talking about a lot of SPAM related cases, this post will be no different. Before you start, let me preface this by saying that clearing a Blackhat SEO Spam injection is probably the biggest PITA (Google It) infection there is. They constantly evolve, making them difficult to detect […] more…Keep Your Gadgets Secure During Summer Travel
Traveling isn’t at all fun. Vacationing is fun, but getting there and dealing with taxis, rental cars, airplanes, hotels and all the unfamiliarity can be unpleasant. And in the midst of all this, criminals are on the lookout for people vacationing. You tend to be more relaxed and your “guard” is down. You also may […] more…Automation is Key With Today’s Website Attacks
When trying to undertand the anatomy of attacks on websites you have to break it down into manageable parts. In my mind it really comes down to two types: Targeted and Opportunistic. More important to understand is how the attack is executed, and that’s what I want to spend some time on in this post. […] more…Who Are You in The Cloud?
Your online activities say a lot about who you are. A majority of Americans use search engines. Billions of email and instant messaging accounts are created worldwide. One in five minutes spent online is spent on social media. There are almost six billion mobile subscribers in the entire world. A considerable number of those who […] more…Backdoor Tool Kit – Today’s Scary Web Malware Reality
We often talk about the importance of keeping your server clean. You can see it in a number of our articles and presentations, this post will likely drive that point home. This past week we came across a nice little package that we felt compelled to share with you. In it, the attacker makes use […] more…Pharma Hack Backdoor Analyzed – PHP5.PHP
Some of you might remember my last Pharma hack post, Intelligent (Pharma) SPAM Decoded, today I will spend some time looking a different variant of the same infection type but focus on a payload that is not encoded or embedded within an existing file, instead it resides in its own file – PHP5.php. “Hmm, maybe […] more…NFC at the Summer Games Could Be Exploited
NFC is an acronym for near field communication, a wireless technology that allows devices to talk to each other. In the case of a mobile wallet application, those devices would be a mobile phone and a point of sale device at a checkout counter. Visa is testing out its NFC service PayWave contactless payment service […] more…Omaha, Nebraska is a Hotbed of Cybercrime Investigation
Regular readers of Krebs on Security will know that small and medium sized businesses and organizations have been the target of cybercrime gangs for several years now. What you might not know is which law enforcement agency investigates those crimes. It turns out that many ZeuS banking trojan investigations were done by the (little known) […] more…"Java Script editor" Remote File edit Vulnerability
“Java Script editor” Vulnerability is a web application Vulnerability, we can upload our deface page on websites by replacing file’s source code with our deface Code,Vulnerable URL : /accounts.newone/javascript/editor/example05_editingfile/default.phpdork : inurl: /accounts.newone/javascript/editor/example05_editingfile/ inurl:/accounts.newone/javascript/ inurl:/accounts.newone/javascript/editor/Goto website.com//accounts.newone/javascript/editor/example05_editingfile/default.php(URL’s example may be chnaged like example04 and example 02 etc)Now click on edit source code and paste […] more…Spring Cleaning Your PC
If your PC is bogged down with useless software and your desktop is jammed with icons and documents, then your PC is next to useless as a productivity tool. Even scarier is the increased likelihood that if you have lost track of your files, you could easily have sensitive personal information exposed without your knowledge. […] more…More Mac Malware Exploiting Java
Reports of new Mac malware variants exploiting CVE-2012-0507 surfaced last week. The Java vulnerability is the same one used by Flashback to infect more than 600 thousand Macs. The first new threat was analyzed by the folks at Trend Micro. The Java applet for Mac actually exploits CVE-2012-0507, and if successful, the payload is the […] more…New Version of OSX.SabPub & Confirmed Mac APT attacks
Late last week, we found evidence of a possible link between a Mac OS X backdoor trojan and an APT attack known as LuckyCat. The IP address of the C&C to which this bot connects (199.192.152.*) was also used in other Windows malware samples during 2011, which made us believe we were looking at the […] more…How to Drive your Business through Social Networking Sites
The ever rising craze for accessing social networking sites for supporting a specific cause or building a purposive, unique community cannot be fended off. Though almost everyone is reaching out to social platforms for catering their needs, business professionals too seem to have joined the cluster. While there’s no doubt that using networking sites may prove to […] more…Apple patches Java hole that was being used to compromise Mac users
Apple has released an update to Java for OS X patching a recently exploited vulnerability targeting Mac users. Update now to protect yourself – or, better yet, remove Java entirely more…Wipe it free: secure wiping software
When it comes retiring PCs at the office or at home, regardless of whether their final destination is a tip or to be sold to recover an investment, it goes without saying that a computer's drives need to be wiped. For the corporate environment, you're going to want to make sure no sensitive data is […] more…A gift from ZeuS for passengers of US Airways
Spam On 20 March, we detected a spam campaign targeting passengers of US Airways. Almost the entire week cybercriminals were sending users the following email allegedly from US Airways: There is a brief description of the check-in procedure and a confirmation code is provided for online reservation. The criminals are obviously banking on any recipients […] more…More information
- Domino’s India Web site hacked, customer data leaked
- Confronting the widening infosec skills gap
- Middle East Group Uses Flash Zero-Day to Deliver Spyware
- Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware
- Flashback Trojan infects Macintosh systems, Apple patch is available
- FTC files complaint against Wyndham Hotels for not protecting sensitive customer information
- Distributed Malware Network Outbreak Using Stats.php
- Satellite study proves global quantum communication will be possible
- Resolved: Libraries Services Interruption
- US Threatens to Block China Telecom From American Market