Web Security


Massachusetts Man Arrested for Hacked Modems

Matthew Delorey of New Bedford, MA was arrested on wire fraud and conspiracy charges
relating to his sale of hacked cable modems modified to permit a user to hide his or her identity
and steal service from Internet service providers. Read the full statement. [FBI.gov]

Hacked Twitter Accounts Corral Cash

According to researchers, cybercriminals are trying to
sell hacked Twitter user names and passwords online for hundreds of
dollars and as much as $1000. Read the full article. [Computerworld]

Anti-Phishing Group: Over 10 Mil Systems Infected

The recently released APWG Phishing Activity Trends Report for Q3 of 2009, details record highs in multiple phishing vectors, but also offers an interesting observation on desktop crimeware infections. Read the full article. [ZDNet]


A vast majority of voice encryption products are seriously flawed, according to controversial tests by an anonymous hacker.

Using the commercially available FlexiSpy wiretapping utility and a
‘homemade’ Trojan, Notrax (the anonymous hacker’s nickname) claims to
have defeated 11 out of 15 voice encryption technologies in tests. Read the full article. [The Register]

By Gunter Ollmann, DamballaThe recent Google Advanced Persistent Threat (APT) dialogue has been
hogging the press for a week now, and each day reveals new (and often
conflicting) insight. As I mentioned on Thursdays blog – “Preemptive Protection” Isn’t – If You’re Battling APT’s
– this particular attack doesn’t represent some new shift in tactics.
It’s not the first APT in the world, in fact I’m pretty sure it’s not
Google’s first exposure to APT’s, and I’m certain it isn’t going to the
last. In fact I’d say its a safe bet to say that there are several
other equivalent APT successes currently operating within Google’s
networks waiting to be discovered. Such is the state of the threat.

In a current advisory, Cisco describes an SQL injection hole which
can be exploited to manipulate or spy out database contents and other vulnerabilities it fixed in versions, 5, 6 and 7 of Unified MeetingPlace. Read the full article. [The H Security]

A study — which was created using the unlikely combination of identity fraud incidence statistics with basic
consumer demographics — indicates that identity thieves are
successfully targeting the wealthy and affluent, regardless of the
systems and software they use. Read the full article. [Dark Reading]

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.