Security_News/해외보안소식 썸네일형 리스트형 25,000 Linux and Unix Servers Compromised in Operation Windigo Security researchers have released a paper documenting a large and complex operation, code named “Operation Windigo”. Since the campaign began in 2011, more than 25,000 Linux and Unix servers were compromised to steal Secure Shell (SSH) credentials, to redirect Web visitors to malicious content, and to send spam. Well-known organizations such as cPanel and Linux Foundation were confirmed victims.. 더보기 IoT Worm Used to Mine Cryptocurrency Last November, we found an Internet of Things (IoT) worm named Linux.Darlloz. The worm targets computers running Intel x86 architectures. Not only that, but the worm also focuses on devices running the ARM, MIPS and PowerPC architectures, which are usually found on routers and set-top boxes. Since the initial discovery of Linux.Darlloz, we have found a new variant of the worm in mid-January. Acc.. 더보기 new BlackOS Software Package Sold In Underground Forum We recently came across this particular post in an underground forum:Figure 1. Underground forum postThis particular post in Russian was advertising a new product, known as “BlackOS”. Contrary to the name, it is not an operating system. However, it is definitely “black”, or malicious: it is used to manage and redirect Internet traffic from malicious/compromised websites to other malicious sites... 더보기 Windows Spy tool equipped with Android malware to hack Smartphones I am quite sure that you must be syncing your Smartphone with your Computers for transferring files and taking backup of your device. If you are using windows operating system and Android devices, then it’s a bad news for you, because FireEye Security Researchers have identified a new piece of windows malware that can also infects your Android Devices. During an investigation of a targeted attac.. 더보기 Carving Network Packets from Memory Dump Files A new feature in the recently released CapLoader 1.2 is the ability to carve network packets from any file and save them in the PCAP-NG format. This fusion between memory forensics and network forensics makes it possible to extract sent and received IP frames, with complete payload, from RAM dumps as well as from raw disk images.CapLoader will basically carve any TCP or UDP packet that is preced.. 더보기 Mug Music Is Good to the Last Drop [Bonnie] is majoring in CS at Princeton and minoring in Awesome. She is taking an electronic music class and had to produce a digital instrument for her midterm project. She and her friend [Harvest] came up with Mug Music, which turns a ceramic mug of water into an instrument.The circuit is very easy to replicate with an Arduino, a coil, and a few resistors and capacitors. [Bonnie] wanted to exp.. 더보기 Warning! Invitation for PC Version of 'Grand Theft Auto V' Game infects Computers with Malware Since all the versions of the popular game ‘Grand Theft’ gone blatant and during the first week of the release of the Grand Theft Auto 4 in 2008, it topped half of millions of dollars, i.e., earning about 5 times as much as the blockbuster movie, Iron Man. But the latest version -- Grand Theft Auto V is only available for the Xbox 360 and PS3 and there are rumors of a PC version of it on GameSto.. 더보기 Apples Goto Fail Tells Us Nothing Good About Cupertinos Software Delivery Process The fact that Apples infamous SSL validation bug actually got out into the real world is pretty terrifying... 원문출처 : http://securityphresh.com/security-news.php?sp_url=http%3A%2F%2Fwww.zdnet.com%2Fapples-goto-fail-tells-us-nothing-good-about-cupertinos-software-delivery-process-7000027449%2F%23ftag%3DRSS14dc6a9 더보기 Warning! Invitation for PC Version of 'Grand Theft Auto V' Game infects Computers with Malware Since all the versions of the popular game ‘Grand Theft’ gone blatant and during the first week of the release of the Grand Theft Auto 4 in 2008, it topped half of millions of dollars, i.e., earning about 5 times as much as the blockbuster movie, Iron Man. But the latest version -- Grand Theft Auto V is only available for the Xbox 360 and PS3 and there are rumors of a PC version of it on 원문출처 : .. 더보기 Sally Beauty Supply Acknowledges Breach Of 25,000 Sally Beauty Supply confirmed Monday that an attacker was able to penetrate its system and make off with fewer than 25,000 records of its customers sensitive banking information. 원문출처 : http://securityphresh.com/security-news.php?sp_url=http%3A%2F%2Fthreatpost.com%2Fsally-beauty-supply-acknowledges-breach-of-25000%2F104851 더보기 이전 1 ··· 178 179 180 181 182 183 184 ··· 186 다음