45cubic

5 Flips | 1 Magazine | 2 Following | @eiween | Nothing perfection,

6 most dangerous cyberattacks

Hackers have upped the ante with this targeted attack, using personal phone calls in addition to traditional emails.<p>It begins as a regular phishing email to people withfinancial roles, such as an accountant or a CFO, said Anne O'Neill, regional head of Symantec's small business division.<p>The scary …

NSA infected 50,000 computer networks with malicious software

Route-Injection Attacks Redirect Internet Traffic

Attackers are accessing routers running on the border gateway protocol (BGP) and injecting additional hops that redirect large blocks of Internet …

Hacking a Reporter: Writing Malware For Fun and Profit (Part 1 of 3)

<i>Matthew Jakubowski (@jaku) contributed to the writing of this blog post.</i><p>Pando Daily editor Adam Penenberg recently published a story about my …

Vulnerability lets attackers hijack iOS apps' web requests over WiFi (video)

Be careful which WiFi hotspots you use -- Skycure has just revealed a web-based exploit that lets attackers hijack a iOS device on the same network through its mobile apps. The technique intercepts some apps' attempts to cache a web status message, redirecting the request to a hostile server; after …