The price for Fullz, the information identity thieves crave, has dropped to between $25 and $40 according to a report on the underground economy by Dell SecureWorks.
Browsing Category: Hacks
Attackers are using route injection attacks against BGP-speaking routers to insert additional hops in the traffic stream, redirecting traffic to third-party locations where it can be inspected before it’s sent to its destination.
Researchers at Imperva have detected a surge in attacks against webservers running JBoss Application Server since the public disclosure of exploit code last month.
A hacker group known as Inj3ct0r claims responsibility for attacks on vBulletin and MacRumors, adding they used a zero day in the popular vBulletin forum software to attack the sites.
A pair of researchers from the University of Cambridge have come up with a new side-channel attack that enables them to infer users’ mobile PIN codes with pretty good accuracy by using the camera and microphone on a mobile phone.
Researchers are debating the potential value of a Bitcoin attack that could allow a small cartel of participants to become powerful enough that it could take over the mining process and whether it’s actually practical in the real world.
Security researcher Henry Hoggard recently discovered a cross site request forgery (CSRF) vulnerability in Twitter’s “add a mobile device” feature, giving him the ability to read direct messages and Tweet from any account.
A Palestinian security researcher demonstrated an exploit for a Facebook bug on the timeline of founder and CEO Mark Zuckerberg.
A British citizen and a number of co-conspirators are being charged with hacking crimes against a number of government and military networks.
If espionage is the world’s second-oldest profession, counterfeiting may be in the running to be third on that list. People have been trying to forge currency for just about as long as currency has been circulating, and anti-counterfeiting methods have tried to keep pace with the state of the art. The anti-counterfeiting technology in use[...]