Yearly Archives: 2012

GPS Software Attacks More Dangerous Than Jamming And Spoofing, Experts Say


December 10, 2012 By
The Vigilant Application Owner

Softpedia – (National) GPS software attacks more dangerous than jamming and spoofing, experts say. Security researchers from Carnegie Mellon University, in collaboration with experts from Coherent Navigation, identified new attack vectors against the Global Positioning System (GPS), Softpedia reported December 10. According to the researchers, a malicious 45-second GPS broadcast is capable of taking down […]

Continue reading...

Only 15% Of Known Malware Caught By Android 4.2′s Verifier


By
The Vigilant Application Owner

The H – (International) Only 15% of known malware caught by Android 4.2’s verifier. A researcher at North Carolina State University found that only 15 percent of known malware samples tested on Android 4.2’s new app verification service were detected. The researcher loaded 1260 malware samples from the Android Malware Genome Project onto 10 Android […]

Continue reading...

Exploit Kit Authors Thrive Due To PoC Code Released By Whitehats


December 5, 2012 By
The Vigilant Application Owner

Help Net Security – (International) Exploit kit authors thrive due to PoC code released by whitehats. Having spent the last year following the development of the Blackhole exploit kit, a Sophos researcher says the last few exploits for zero-days added to it were all works of whitehat researchers who published their own exploit code online. […]

Continue reading...

Fast Cracking Of MySQL Passwords Demonstrated


December 4, 2012 By
The Vigilant Application Owner

The H – (International) Fast cracking of MySQL passwords demonstrated. A hacker by the name of Kingcope has found another security problem with the popular MySQL database. Using an already well-known characteristic of the database’s user management, it is possible to significantly increase the speed of a brute force attack. The trick allowed him to […]

Continue reading...

Season’s Gr3371ng5 – Hacker Releases Exploits For MySQL And SSH


December 3, 2012 By
The Vigilant Application Owner

The H – (International) Season’s gr3371ng5 – hacker releases exploits for MySQL and SSH. The hacker who goes by the name KingCope released several exploits December 2, some of which date back to 2011. The exploits mostly target the now-Oracle-owned MySQL open source database, but the SSH servers by SSH Communications Security and FreeSSHd/FreeFTPd are […]

Continue reading...

Highway Traffic Monitoring System Has Exploitable Electronic Flaws, Says CERT


By
The Vigilant Application Owner

Government Security News – (National) Highway traffic monitoring system has exploitable electronic flaw, says CERT. Systems that can track automotive traffic on roadways, providing speed and highway traffic behavior patterns has a flaw that could allow a skilled hacker to break in, according to the U.S. Industrial Control System Computer Emergency Readiness Team (ICS-CERT). A […]

Continue reading...

Crooks Inject Malicious Java Applet Into FOREX Trading Website


November 30, 2012 By
The Vigilant Application Owner

The Register – (International) Crooks inject malicious Java applet into FOREX trading website. FOREX trading Web site Trading Forex was contaminated with a malicious Java applet that is designed to install malware on the systems of visiting surfers, The Register reported November 30. The Web site remained contaminated as of mid-day November 29 according to […]

Continue reading...

Email Hacks Router


By
The Vigilant Application Owner

The H – (International) Email hacks router. A whole range of Arcor, Asus, and TP-Link routers are vulnerable to being reconfigured remotely without authorization. A security researcher demonstrates that just displaying an email within the router’s own network can have far-reaching consequences: when opened, his specially crafted test email reconfigures the wireless router so that […]

Continue reading...

Shylock’s New Trick For Evading Malware Researchers


By
The Vigilant Application Owner

Help Net Security – (International) Shylock’s new trick for evading malware researchers. The Shylock financial malware platform continues to evolve in order to bypass new defensive technologies put in place by financial institutions and enterprises. While analyzing a recent Shylock dropper Trusteer noticed a new trick it uses to evade detection. Namely, it can identify […]

Continue reading...