Friday, July 20, 2012
“Scan from a Hewlett-Packard Officejet 745065″ and 94.23.116.30
These fake Scan from a Hewlett-Packard Officejet emails have been around for a small even though now. Here s a slightly new verson: From: hp@victimdomain.com Date: 11 October 2011 23:41 Subject: Scan from a Hewlett-Packard Officejet 745065 A document was scanned and sent to you utilizing a Hewlett-Packard HP Officejet 63639D. Sent by: SINA Images : See More..
Mass infections from jjghui.com/urchin.js (SQL injection)
We are seeing multiple sites compromised with malware from jjghui.com/urchin.js. Most of them are IIS/ASP sites along with the infection method seems to be similar to the Lizamoon mass infections from a few months ago (SQL injection). according to Google, almost 1.5k sites have been blacklisted already because of it, and you may find 80k+ pages on See More..
Celebrity email hacker suspect arrested by FBI
Nubile female film stars is going to be breafactor a sigh of relief nowadays at the news that the FBI has arrested a man suspected of hacking into celebrity s phones and emails accounts and stealing their invariably nude photos. The FBI s invesigation into the hacking incidents, dubbed Operation Hackerazzi , has certainly been pressured to catch those responsible See More..
VB2011 talks, Part 1
Missed those talks at VB2011? some notes on a initial set of talks I attended. A look at the cybercrime ecosystem too as the way it works, Dmitry Bestuzhev On the underground market, It's possible to find lots of issues such as clones of actual ID documents (shipping together with your own picture) as well as See More..
Tuesday, June 19, 2012
Craigslist Targeted: Killers Reaching Innocents
Craigslist is an on the web network comprising of employers, organization owners and service providers, Marketing and advertising services and selling points. you'll find sections for jobs, classified, actual estate and more. Craigslist allow users to write-up adz to obtain and sell number of points on the website, and users can interact and work accordingly. Craigslist is utilised by See More..
Predictions Made by Supercomputer
A supercomputer named SGI Altix that is too known as Nautilus based in the University of Tennessee was fed with millions of articles dating back to middle of 20th century. The supercomputer provided results, which were most surprising for researchers. The method was designed to analyze articles, news feeds, journals, reports and other resources of See More..
Angry Birds: Why This Game is quite Popular?
The term Angry Birds reminds of video games from early 90s and several people might be surprised to know what is Angry Birds? It's basically a video game designed for mobiles phones and It's developed by Rovio Mobile based in Finland. The game was launched in December 2009 for iOS platform and it See More..
Subscribe to:
Posts (Atom)
บทความที่ได้รับความนิยม
-
Last week (10/12), Armorize announced a brand new mass site-injection attack, which they had begun tracking on the 9th. Briefly, the attack ...
-
It’s Cyber Monday – the initial Monday after the American Thanksgiving holiday, and traditionally a time when consumers spfinish oodles of d...
-
Patrick, our resident rogue AV skilled from the AV Labs, have his eyes set on one particular family-FakeScanti. This rogue family quite firs...
-
Our study and study of Duqu malware continues. In our previous report, we made two points: - you may find more drivers than it was previousl...
-
As in previous years, we are utilised to see a peak in the phishing attacks starting in the beginning of December and ending in the middle o...
-
believe twice before you click on any photo links which you receive from your Facebook friends. Danish security researchers at CSIS have dis...
-
In an interview with AllThingsD these days Carrier IQ, the organization accused of Making spyware software for mobile carriers, cleared the ...
-
Yesterday, British police arrested an unnamed 52-year-old man in Milton Keynes for computer hacking related to the phone hacking fiasco comm...
-
One more bunch of “redret” sites to block, either by dokey name or IP. These dokeys are being employed as the payloads for spam emails and l...
-
Malware is on the rise. at the beginning of 2008, our malware collection had 10 million samples. nowadays we have already surpassed 70 milli...
Popular Posts
-
Last week (10/12), Armorize announced a brand new mass site-injection attack, which they had begun tracking on the 9th. Briefly, the attack ...
-
It’s Cyber Monday – the initial Monday after the American Thanksgiving holiday, and traditionally a time when consumers spfinish oodles of d...
-
Patrick, our resident rogue AV skilled from the AV Labs, have his eyes set on one particular family-FakeScanti. This rogue family quite firs...
-
Our study and study of Duqu malware continues. In our previous report, we made two points: - you may find more drivers than it was previousl...
-
As in previous years, we are utilised to see a peak in the phishing attacks starting in the beginning of December and ending in the middle o...
-
believe twice before you click on any photo links which you receive from your Facebook friends. Danish security researchers at CSIS have dis...
-
In an interview with AllThingsD these days Carrier IQ, the organization accused of Making spyware software for mobile carriers, cleared the ...
-
Yesterday, British police arrested an unnamed 52-year-old man in Milton Keynes for computer hacking related to the phone hacking fiasco comm...
-
One more bunch of “redret” sites to block, either by dokey name or IP. These dokeys are being employed as the payloads for spam emails and l...
-
Malware is on the rise. at the beginning of 2008, our malware collection had 10 million samples. nowadays we have already surpassed 70 milli...