Items Tagged with "Hacking"


E973b16363b3de77b360563237df7e32

Hacking Virtual Machines Part 3 - Unpatched Hyper-V

November 28, 2010 Added by:Bozidar Spirovski

Virtualization is considered to be the new renaissance in computing. Suddenly, all those over sized servers are put to great use by putting multiple Guest OS's on them. But running IT services in a virtualized environment brings a whole host of new opportunities for hackers...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines Part 2 - Virtualization Environments

November 21, 2010 Added by:Bozidar Spirovski

Virtualization is considered to be the new renaissance in computing. Suddenly, all those over sized servers are put to great use by putting multiple Guest OS's on them. But running IT services in a virtualized environment brings a whole host of new opportunities for hackers...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Criminal Hackers: The Soldiers of the Web Mob

November 20, 2010 Added by:Robert Siciliano

This criminal entity is one of the most sophisticated and damaging on the Internet, and perfected a mass-production system for deploying phishing sites and crimeware– malware designed specifically to automate identity theft and facilitate unauthorized transactions from consumer bank accounts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Indicted for Breaching Federal Reserve Bank

November 19, 2010 Added by:Headlines

A hacker has been charged with accessing systems at the Federal Reserve Bank in Cleveland and stealing at least 400,000 credit and debit card numbers. This breach is particularly troubling, as transactions from every bank in the country are processed through branches of the Federal Reserve..

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Why an Anti-Virus Can’t Protect You from All Viruses

November 18, 2010 Added by:Dan Dieterle

Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Russian Banks May Be Linked to Zeus Hackers

November 18, 2010 Added by:Headlines

The Chief of the Russian Financial Monitoring Service, Yury Chikhankin, announced a pending investigation into whether Russian financial institutions participated in laundering funds stolen by those responsible for the infamous Zeus Trojan virus...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines Part 1 - Sniffing

November 17, 2010 Added by:Bozidar Spirovski

If one virtual machine starts a sniffer - putting the adapter in a promiscuous mode - it is possible to sniff traffic from the other virtual machines and collect all sorts of interesting information. The attack is a second phase attack after the first virtual machine has been compromised...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Attacks Against Critical Infrastructure On the Rise

November 16, 2010 Added by:Headlines

More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CitiBank Denies Losing Millions To Russian Hackers

November 13, 2010 Added by:Headlines

Reports from several news organizations suggest the infamous Russian Business Network is behind the heist, and that the FBI has begun investigating the theft, though officials at CitiGroup have denied the events ever took place...

Comments  (0)

E973b16363b3de77b360563237df7e32

Facebook Hacking, Security, and Privacy Concerns

November 11, 2010 Added by:Bozidar Spirovski

It’s not hacking if users’ privacy settings are searchable, right? It depends on who you ask. Current Facebook privacy settings come with a recommendation that urges users to leave their pages searchable to everyone. You might be surprised at the amount of information that’s accessible...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

DDoS Attacks Land Hacker In Jail

November 11, 2010 Added by:Headlines

An Ohio student was sentenced to prison after being convicted for Distributed Denial of Service (DDoS) attacks against right-wing websites, including sites administered by Rudy Giuliani, Ann Coulter and Bill O'Reilly...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Pwns U of W Classroom Projectors

November 11, 2010 Added by:Headlines

The incident is characteristic of a long line of prestige attacks in which hackers perform some level of disruption in order to gain notoriety and satisfy their own egos, but the authorities and university administration are taking the incident seriously...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Metasploit and SCADA Exploits: Dawn of a New Era?

November 04, 2010 Added by:shawn merdinger

On October 18, a significant event occurred concerning threats to SCADA, the addition of a zero-day exploit for the RealFlex RealWin SCADA software product into the Metasploit repository. This is the first SCADA exploit added to Metasploit. Striking facts about this event follow...

Comments  (5)

4ff49873e3fed9a24adf0d37ae00b780

Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)

E973b16363b3de77b360563237df7e32

Top 5 Ridiculous Hacking Scenes in Movies

November 03, 2010 Added by:Bozidar Spirovski

Like any technology-fed phenomenon with increasing public exposure, hacking is often ill-conceived and exaggerated in movie scenes. The following are five of the most implausible and amusing scenes that have resulted from this approach to hacker depiction in movies...

Comments  (13)

Page « < 10 - 11 - 12 - 13 - 14 > »