Chinese report turns the tables and links US IP addresses to increased cyber-attacks on its websites
Mashable’s Favourite Wi-Fi Names
August 9, 2011Mashable has done a quick survey and found what they consider to be the best Wi-Fi network names… Just funny, for once. Follow the Link…
Beresford Backdoor, Explored
August 9, 2011Reid Wightman has started to take a look at Dillon Beresford’s ‘basisk’ backdoor on some of Siemens’s PLC firmwares. His first finding is that the password is not encrypted as was previously thought. It would be interesting to continue monitoring this effort…
Trojanized Android App Checks for Keywords in SMS Messages
August 9, 2011Android malware that monitor messages from specific numbers sent to infected devices have been frequently seen in the past. These typically intercept messages from premium numbers in order to prevent affected users from suspecting device infection. The Android malware we recently saw, however, took a different approach, as it monitored certain keywords contained in text messages received via infected devices instead.
Homemade drone can launch cyber attacks
August 6, 2011US computer security specialists have showed off a homemade drone aircraft capable of launching airborne cyber attacks, hijacking mobile phone calls, or even delivering a dirty bomb.
Rich Perkins and Mike Tassey built the bright yellow Wireless Arial Surveillance Platform (WASP) in a garage from a used US Army target drone that they customised to find mobile phones and internet hotspots.
Insulin Pumps, Monitors Vulnerable To Hacking
August 4, 2011Even the human bloodstream isn’t safe from computer hackers.
A security researcher who is diabetic has identified flaws that could allow an attacker to remotely control insulin pumps and alter the readouts of blood-sugar monitors. As a result, diabetics could get too much or too little insulin, a hormone they need for proper metabolism.
Jay Radcliffe, a diabetic who experimented on his own equipment, shared his findings with The Associated Press before releasing them Thursday at the Black Hat computer security conference in Las Vegas.
North Korean hackers hired to attack South Korea game network
August 4, 2011More than 30 North Korean hackers were hired to work in China by a South Korean crime ring to steal the personal data of South Korean gamers, and channeled $5 million to their impoverished country in compensation, South Korea’s police said on Thursday.
Anonymous testing LOIC replacements – new tool uses server exploits
August 4, 2011Anonymous is developing a new DDoS tool. So far, what they have is something that is platform neutral, leveraging JavaScript and vulnerabilities within SQL to create a devastating impact on the targeted website. But will the tool last, and will it make law enforcement’s job harder in the long run?
Revealed: Operation Shady RAT
August 4, 2011Massive Cyber-Spying Operation, ‘Shady Rat,’ Revealed: Dozens of government entities, major companies and non-profits were the victims of a massive, years-long cyber-attack effort, according to a study released Wednesday by security firm McAfee.

- McAfee
- A map from the McAfee report showing locations of hacking victims.
Dubbed “Operation Shady Rat” by the report’s author, Dmitri Alperovitch, the effort took data from groups ranging from the United Nations to media organizations, the government of Taiwan and the International Olympic Committee, the study says.
The targeting of the IOC and the World Anti-Doping Agency, which were targeted around the 2008 Olympics – “potentially pointed a finger at a state actor behind the intrusions, because there is likely no commercial benefit to be earned from such hacks,” Alperovitch wrote. And it doesn’t take too much reading between the lines to conclude which nation he’s talking about. Vanity Fair, in its scoop on the report, quotes other security experts as saying the signs point to China.
Digital Hit Men for Hire
August 2, 2011In a blog written by Brian Krebs, he remarks a new trend: The DDoSers of the world are coming out of their underground forums and chatrooms and start to advertise their services to a much broader audience.
Posted by Editor 