ProjectX WHMCS Exploit Tool

We decided to stop the project, “WHMCS LFD Exploiter” and decided to make a modification out of it in PHP. The function is still the same because it still gets the db_username and the db_password but what has been changed is that it is user friendly and allows the user…

read more

Cyber criminals exploit psychological weaknesses

CYBER CRIMINALS exploit psychological weaknesses, not just technological flaws, to manipulate victims and make their scams work, two Irish academics said this week. View full post on cyber crime hacking – Yahoo! News Search Results View full post on National Cyber Security » Computer Hacking Gregory Evans | LinkedIn Interview…

read more

Microsoft announces workaround for the Duqu exploit

Microsoft have posted security advisory 2639658 to address the recently disclosed Windows kernel vulnerability (CVE-2011-3402) exploited by the Duqu malware. Microsoft has determined the flaw is in the processing of embedded True Type Fonts (TTFs). According to Microsoft: “The attacker could then install programs; view, change, or delete data; or…

read more

Hacker Claiming He Can Exploit Windows Update

A hacker who stole SSL certificates from a Dutch-based certificate authority claims that he can distribute malware through Microsoft’s Windows Update. There’s a hacker out there somewhere claiming that he can issue fake updates to Windows-based desktops and laptops thanks to a set of stolen digital certificates. This means he…

read more

New Trusteer Cybercrime Prevention Architecture Adds Browser Exploit Removal and Fraudster Machine Fingerprinting to …

Trusteer, the leading provider of cybercrime prevention solutions, today announced new versions of the four products which make up its Cybercrime Prevention Architecture. The new capabilities remove malicious exploits in web page content, fingerprint fraudster machines attempting to access protected web applications, protect iOS and Android mobile devices from financial…

read more