The typical phishing attack included creating a fake login page, storing them in a server and emailing the victim with the fake login page link. A new research paper from InfoSec student, Henning Klevjer shows how a hacker can create phishing attacks without the need for storing the fake login page.

Read More

 

java

New Java vulnerability allows attacker to escape sandbox and execute arbitrary code on affected systems.

Read More

 

images

Russian security firm Dr.Web has identified a new Trojan named BackDoor.Wirenet.1 which runs on both Linux as well as Mac OS X. This is the first ever cross platform Trojan that has been discovered to affect both of the aforementioned operating systems.

Read More

 

Java

The exploit has been successful in installing a variant of the Poison Ivy trojan. It is originating from servers in China and Oracle has not yet treleased any statement on fixing the exploit.

Read More

 

wodpress_security

A look at issues of our current security infrastructure.

Read More

 

msft_logo1

It’s that day of the month when you have to fire up the Windows Update and install all of those very precious security updates. Microsoft and Adobe has released a number of updates for which is available for download right now.

Read More

 

Bitcoin

Users of the Bitcoinica platform are suing Bitcoinica for $460,457.70 over lost Bitcoins. This includes the price of lost Bitcoins and other damages.

Read More

 

viruslogo

Zeus trojan rebuilt to attack BlackBerry handsets. All your SMS are belong to some Swede.

Read More

 

dropbox

Dropbox users are complaining about a possible spam wave targeted at emails used to login to Dropbox.

Read More

 

Dark Knight Rises Movie Poster

Dark Knight Rises is definitely going to break box office records all over the world, however, even before the movie has even released, there are several torrent websites which have been filled up with fake torrents for the Dark Knight Rises.

Read More

 

yahoo-voice.thumbnail

Reports are coming in that hackers have managed to hack into a Yahoo service and steal sensitive data of more than 453000 of its customers. According to a security firm, Trustedsec, who first reported the incident, the service that was compromised was Yahoo Voice.

Read More

 

Social Q&A site Formspring has been hacked, and a dump of user passwords has appeared online. As a precautionary measure, Formspring is forcing every user to reset his password.

Read More

 

dnschanger-thumb

Does the name DNSChanger sound familiar? Well I’m quite sure it wasn’t to many until recently when the word went out on web, thanks to the kinda hyped initiative from ISPs and FBI. Most infected users were incognizant of the threat of getting disconnected from the internet. Before we get down to solving the problem, let’s get a formal introduction to the threat it possesses.

Read More

 

136px-US-FBI-ShadedSeal.svg

The final deadline for those affected by the DNSChanger to reset their DNS servers is getting nearer. But reports suggest that there are still more than 500000 computers that use the rogue servers. And, as the date reaches July 9th, all of the computers that still use the rogue settings will be cut off from the internet, as the FBI shuts down the temporary servers that were allowing them to connect to the internet until now.

Read More

 

tor_logo

The key from one device can be extracted, and can be used to intercept traffic from any other Cyberoam client. Cyberoam has not responded publicly on this matter.

Read More

 

1 2 3 4 5 6 7 8 12
 
Copyright 2006-2012 Techie Buzz. All Rights Reserved. Our content may not be reproduced on other websites. Content Delivery by MaxCDN