blog trackingRealtime Web Statistics Exploits | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘exploits’

Former world’s most wanted hacker Kevin Mitnick now sells zero-day exploits

Former world’s most wanted hacker Kevin Mitnick now sells zero-day exploits



Kevin Mitnick, a famous (former) hacker who is now a security consultant, has ventured into a new business: buying and selling high-end zero-day exploits. Dubbed Absolute Zero Day Exploit Exchange, the six-month-old service sells exclusive unpatched exploits to corporate as […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Bitcoin Malware Attack Exploits Russia-Ukraine Crisis

Source: National Cyber Security – Produced By Gregory Evans

Bitcoin Malware Attack Exploits Russia-Ukraine Crisis



A hacker group is trying to leverage the ongoing conflict between Russia and Ukraine as it distributes malware that is capable of targeting bitcoin wallets. A report by Bitdefender Labs, a cybersecurity firm that focuses on the digital currency market, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Bitcoin Malware Attack Exploits Russia-Ukraine Crisis appeared first on National Cyber Security.

View full post on National Cyber Security

Snapchat exploits published by snubbed researchers

  After months of being ignored by the company behind the popular instant messaging app Snapchat, Australian hackers Gibson Security has finally published exploits that they discovered. The exploits could be used to match names and phone numbers on Snapchat. Additionally, unscrupulous hackers could also use the exploits to create thousands of fake Snapchat accounts en masse. […]

View full post on Gregory d. evans

CDI 2012 – SEC504 – Hacker Techniques, Exploits & Incident Handling

SANS is offering 1 course(s) at this training event being held in 201212 – SEC504, DC US starting on December 9, 2012. Please visit http://www.sans.org/event/29165 for complete information and to register for this event. View full post on SANS Institute – ALL Training Events

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Trend Micro ‘virtual shield’ protects against unpatched exploits

Trend Micro has broadened its cloud-based security infrastructure so that its products can receive actionable threat intelligence that lets the security software act like a “virtual shield” against many web-based threats. View full post on Techworld.com security

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Black Hat: Most Java malware exploits “type confusion” vulnerability

A researcher investigated Java exploits, and drew on one well-know example, to explain how one of the most common classes of attack spreads. View full post on Latest articles from SC Magazine News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Cross-platform malware exploits Java to attack PCs and Macs

The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers.

View full post on malware – Yahoo! News Search Results

View full post on National Cyber Security » Virus/Malware/Worms

Researchers Release New Exploits to Hijack Critical Infrastructure

New attack code that can be used to take over the control systems of refineries, power plants and factories has been released into the wild. The purpose? To push vendors to take security seriously.

View full post on computer worm – Yahoo! News Search Results

View full post on National Cyber Security » Virus/Malware/Worms

Mac malware exploits unpatched drive-by Java vulnerability

Malware striking Mac computers is making the headlines again, this time exploiting a drive-by vulnerability in Java that has left Apple users dangerously exposed to attack.

The new Mac malware exploits a Java vulnerability (known as CVE-2012-0507), that Apple users are still not patched against.

Apple users won’t feel any consolation at all in the knowledge that their Windows cousins have been protected against the flaw since February.

Sophos security products identify the various components of the Mac malware attack as Exp/20120507-A, Troj/JavaDl-JI, OSX/Dloadr-DMU and OSX/Flshplyr-B – intercepting the threat before it can compromise Mac owners’ computers.

Once again, you’re left to ponder whether having Java installed on your computer is really worth it. Having Java on your PC or Mac may help you run some archaic applications, but it can also dramatically widen the attack surface which hackers can exploit.

My advice is that if you have no real need for Java, remove it.

The latest version of Mac OS X (known as Lion), unlike earlier editions, does not include Java by default, meaning users are not at risk *unless* they have subsequently installed the software.

If you’re not already doing so, run anti-virus software on your Macs. If you’re a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/1R-sq3qNJGU/

View full post on National Cyber Security

Page 1 of 3123»

My Twitter

Gregory D. Evans On Facebook