matteoca

217 Flips | 1 Magazine | 12 Followers | @matteoca | Keep up with matteoca on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “matteoca”

Self-propagating ZeuS-based source code/binaries offered for sale

Reading Time: ~2 min.<p>Like every ecosystem, the cybercrime ecosystem has its own set of market disrupting forces whose applicability and relevance …

PayPal Enumeration / Information Disclosure ≈ Packet Storm

'BinaryPig' Uses Hadoop To Sniff Out Patterns In Malware

At Black Hat next month, researchers will release new set of big-data tools that can find patterns in the data among security firms' massive …

So… About This Snowden Affair

“Jesters do oft prove prophets” ~ William Shakespeare – King Lear, Act 5, Scene III. NOTE: This post has updates below since time of writing. My …

Nmap NSE Vulscan 1.0 Released

Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to …

Cyber attack hits South Korea websites

<b>South Korea has issued a cyber alert after an apparent hacking attack on government websites.</b><p>The website of the presidential office was one of several official and media sites hit by an apparently co-ordinated attack on Tuesday morning, reports said.<p>The identity of the hackers was not known, a …

Cyber-attacks

Healthcare Interrupted - Top Five Vulnerabilities Hackers Can Use Right Now To Shut Down Medical Devices

As medical science advances, so too does the equipment used to deliver care. In a modern-day hospital, more and more medical devices, such as IV …

Mozilla Firefox 21.0 Denial Of Service ≈ Packet Storm

Blackhatonomics: An Inside Look at the Economics of Cybercrime

With WikiLeaks’ help, Snowden lands in Moscow, headed on to “democratic nation”

On Sunday, the NSA leaker left Hong Kong on a commercial flight to Russia.<p>Just two days after the United States government criminally charged Edward …

Microsoft Was Lying About Skype, It's More or Less an NSA Honeypot

06.22.13<p>Microsoft Was Lying About Skype, It’s More or Less an NSA Honeypot<p>Posted in Microsoft at 11:19 am by Dr. Roy Schestowitz<p><i>National Skype</i> …

Debugging Android Libraries using IDA

Create anAndroid Virtual Device (AVD) for use in the emulator and make sure it works.<p>Start theemulator, and when the emulator is running, use the …

Google Translate Cross Site Request Forgery ≈ Packet Storm

WordPress 3.5.2 update fixes security issues

Ghacks is running on WordPress and whenever the software gets updated, I not only update the blog but also write about it here on the site. The …

Internet Storm Center Diary 2018-07-02, Author: Johannes Ullrich

In the last few days (27 June on), my honeypot collected from various sources the same eight PHP POST to these scripts. Here are the eight scripts it …

Malwarebytes Anti-Exploit Beta is now available

When ZeroVulnerabilityLabs' ExplotShield was first released back in September of 2012 it made quite the big splash on the Internet. The application …

The top secret rules that allow NSA to use US data without a warrant

Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders …

Flush bash_history after each command : linux

Never Give Stores Your ZIP Code. Here's Why

Why do merchants sometimes ask us for our ZIP code when we buy something?<p>I recently visited the Mob Museum in Las Vegas, an interesting addition to Sin City’s attractions. I paid my admission with a credit card, prompting the museum ticket seller to ask me: “What’s your ZIP code?”<p>When I paused for …

New E-Shop sells access to thousands of malware-infected hosts, accepts Bitcoin

Reading Time: ~2 min.<p>Thanks to the buzz generated over the widespread adoption of the decentralized P2P based E-currency, Bitcoin, we continue to …

Millions At Risk From Critical Vulnerabilities From WordPress Plugins

First time accepted submitter dougkfresh writes <i>"Checkmarx's research lab identified that more than 20% of the 50 most popular WordPress plugins are</i> …

Applying Function Types to Structure Fields in IDA « Applying Function Types to Structure Fields in IDA

IDA Pro comes with an incredibly useful array of type information gathered from various compilers. Whenever a user names a location, IDA searches its …

Yahoo's Very Bad Idea to Release Email Addresses

Yahoo is releasing inactive Yahoo IDs so that users can score a better email address. This means you can finally have albert@yahoo.com instead of …

Microsoft will pay up to $100K for new Windows exploit techniques

Redmond finally joins Google, Mozilla, by offering cash rewards for security flaws.<p>Microsoft has announced that it will give security researchers …

Altering Text In eBooks To Track Pirates

wwphx writes <i>"According to Wired, 'German researchers have created a new DRM feature that changes the text and punctuation of an e-book ever so</i> …

US, Russia to install “cyber-hotline” to prevent accidental cyberwar

Agreement comes as tension builds with China over mutual hacking attacks.<p>As leaked details of ongoing network surveillance and espionage programs by …

Joomla Cryptography Weakness ≈ Packet Storm

NSA Implementing 'Two-Person' Rule To Stop The Next Edward Snowden

The next Edward Snowden may need a partner on the inside.<p>On Tuesday, National Security Agency Director Keith Alexander told a congressional hearing of the Intelligence Committee that the agency is implementing a “two-person” system to prevent future leaks of classified information like the one …

Kickass Torrents' KAT.ph Domain Seized By Philippine Authorities

hypnosec writes <i>"Kickass Torrents hasn't been accessible since sometime yesterday, and now it has been confirmed that the domain name of the torrent</i> …

CPU-Z tells you all there is to know about your Android hardware

CPU-Z is a popular software for Windows that provides you with detailed information about the computer's processor, mainboard, and other hardware …