SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Information security news




News Bytes
Facebook helps FBI shut down Butterfly Botnet


                            US Department of Justice
                            arrested 10 suspects involved
                            in global Butterfly botnet
                            operation that infected more
                            than 11 million systems and
                            caused more than $850m in
                            losses. Yahos targeted
                            Facebook users from 2010 to
                            October 2012. Facebook’s
                            security team provided
                            assistance to law enforcement
                            throughout the investigation
                            by helping to identify the root
                            cause, the perpetrators, and
                            those affected by the malware.
Yahoo! mail hijacking exploit


                                 A “cross-site scripting” (XSS)
                                weakness in yahoo.com lets
                                attackers steal cookies from
                                Yahoo! Webmail users. The
                                XSS flaw falls into the
                                category of a stored
                                vulnerability, which inserts
                                malicious code into a file,
                                database, or back-end
                                system. The malicious script
                                is then retrieved from the
                                server when it requests the
                                stored information.
25-GPU cluster cracks every standard Windows
password in <6 hours


                              A five-sever Linux-based GPU cluster
                              running the Virtual OpenCL cluster
                              platform that harnesses the power
                              of 25 AMD Radeon graphics cards
                              achieves 350 billion-guess-per-
                              second speed when cracking
                              password hashes generated by the
                              NTLM cryptographic algorithm that
                              Microsoft has included in every
                              version of Windows since Server
                              2003. As a result, it can try an
                              astounding 95^8 combinations in
                              just 5.5 hours, enough to brute force
                              every possible eight-character
                              password containing upper- and
                              lower-case letters, digits, and
                              symbols. Such password policies are
                              common in many enterprise settings.
New series of DDoS attacks against U.S Financial
Institutions


                                 After an almost one-month
                                 hiatus, five U.S.-based
                                 banks, U.S. Bancorp,
                                 JPMorgan Chase, Bank of
                                 America, PNC Financial
                                 Services Group, and
                                 SunTrust, are again being
                                 targeted for a series of
                                 denial of service (DoS)
                                 attacks by a hacker group
                                 called Izz ad-Din al-Qassam
                                 Cyber Fighters.
Google's Android app scanner falls short in security
test


                                 The Google scanner that
                                 checks apps for malware
                                 before they are installed on an
                                 Android smartphone or tablet
                                 has a detection rate that falls
                                 far behind that of third-party
                                 antivirus products. Out of
                                 more than 1,200 malware
                                 samples, the Google scanner
                                 detected 193 for a "low
                                 detection rate of 15.32%”.
                                 Antivirus software needs to
                                 have a rate of more than 80%
                                 to be considered at least good.
Syria suffers nation-wide communications outage


                               On 29 November, Syria witnessed
                               a nation-wide Internet blackout.
                               The blackout isolated the country,
                               blocking landlines and cellphone
                               networks. Many speculated that
                               the outage was caused by
                               President Bashar Assad’s regime,
                               as the exclusive provider of
                               Internet access in Syria is the
                               state-run Syrian
                               Telecommunications
                               Establishment. The regime
                               however, blamed it on the rebels
                               as a “terrorist act”.
Samsung Smart TV security hole allows hackers to
watch you, change channels or plug in malware


                               Researchers at ReVuln have found a
                               vulnerability in an unspecified model
                               of a Samsung LED 3D TV that they
                               exploited to get root access to the TV
                               and any attached USB drives. The
                               researcher’s could access :
                               • TV settings and channel lists
                               • SecureStorage accounts
                               • Widgets and their configurations
                               • History of USB movies
                               • ID
                               • Firmware
                               • Whole partitions
                               • USB drives attached to the TV
Internet Explorer flaw


                         A flaw in the way Internet
                         Explorer implements the
                         Event Model allows an
                         attacker to track mouse
                         movements anywhere on
                         the screen, even outside of
                         the browser, regardless of
                         the browser window’s state
                         (minimized, maximized,
                         focused or unfocused) as
                         well as the state of the
                         control, shift and alt keys.

Weitere ähnliche Inhalte

Was ist angesagt?

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials TheftLavi Lazarovitz
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark LabsLavi Lazarovitz
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 

Was ist angesagt? (20)

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Software theft
Software theftSoftware theft
Software theft
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Code protection
Code protectionCode protection
Code protection
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials Theft
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
BPS-DellWorld
BPS-DellWorldBPS-DellWorld
BPS-DellWorld
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark Labs
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8
 

Andere mochten auch (16)

Belle Bretagne
Belle BretagneBelle Bretagne
Belle Bretagne
 
ANU-MIMO_whitepaper
ANU-MIMO_whitepaperANU-MIMO_whitepaper
ANU-MIMO_whitepaper
 
Brt session 2 b seminar presentation indii format do 21 jan 10 b indo
Brt session 2 b seminar presentation indii format do 21 jan 10 b indoBrt session 2 b seminar presentation indii format do 21 jan 10 b indo
Brt session 2 b seminar presentation indii format do 21 jan 10 b indo
 
Monthly market report 0612
Monthly market report 0612Monthly market report 0612
Monthly market report 0612
 
Blackspot 8 citrun
Blackspot 8   citrunBlackspot 8   citrun
Blackspot 8 citrun
 
Mobile learning workshop
Mobile learning workshopMobile learning workshop
Mobile learning workshop
 
18 Green Living Tips
18 Green Living Tips18 Green Living Tips
18 Green Living Tips
 
Ver mirar
Ver mirarVer mirar
Ver mirar
 
Podcasting workshop 2010
Podcasting workshop 2010Podcasting workshop 2010
Podcasting workshop 2010
 
Understanding governance
Understanding governanceUnderstanding governance
Understanding governance
 
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketing
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketingLandscape of U.S. Financial Professionals & Firms, in terms of direct marketing
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketing
 
Planejamento de Comunição em Meios Digitais
Planejamento de Comunição em Meios DigitaisPlanejamento de Comunição em Meios Digitais
Planejamento de Comunição em Meios Digitais
 
2008 pmk-169
 2008 pmk-169 2008 pmk-169
2008 pmk-169
 
Schulerhof Wellness-Brochure 2015
Schulerhof Wellness-Brochure 2015Schulerhof Wellness-Brochure 2015
Schulerhof Wellness-Brochure 2015
 
Música Tudo tem seu par (Cancioneiro Espírita)
Música Tudo tem seu par (Cancioneiro Espírita)Música Tudo tem seu par (Cancioneiro Espírita)
Música Tudo tem seu par (Cancioneiro Espírita)
 
Pengantar rs-sby-30may12
Pengantar rs-sby-30may12Pengantar rs-sby-30may12
Pengantar rs-sby-30may12
 

Ähnlich wie News Bytes - December 2012

cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewAntiy Labs
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 

Ähnlich wie News Bytes - December 2012 (20)

cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial View
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Information security
Information securityInformation security
Information security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
NetWitness
NetWitnessNetWitness
NetWitness
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
It ppt new
It ppt newIt ppt new
It ppt new
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

News Bytes - December 2012

  • 2. Facebook helps FBI shut down Butterfly Botnet US Department of Justice arrested 10 suspects involved in global Butterfly botnet operation that infected more than 11 million systems and caused more than $850m in losses. Yahos targeted Facebook users from 2010 to October 2012. Facebook’s security team provided assistance to law enforcement throughout the investigation by helping to identify the root cause, the perpetrators, and those affected by the malware.
  • 3. Yahoo! mail hijacking exploit A “cross-site scripting” (XSS) weakness in yahoo.com lets attackers steal cookies from Yahoo! Webmail users. The XSS flaw falls into the category of a stored vulnerability, which inserts malicious code into a file, database, or back-end system. The malicious script is then retrieved from the server when it requests the stored information.
  • 4. 25-GPU cluster cracks every standard Windows password in <6 hours A five-sever Linux-based GPU cluster running the Virtual OpenCL cluster platform that harnesses the power of 25 AMD Radeon graphics cards achieves 350 billion-guess-per- second speed when cracking password hashes generated by the NTLM cryptographic algorithm that Microsoft has included in every version of Windows since Server 2003. As a result, it can try an astounding 95^8 combinations in just 5.5 hours, enough to brute force every possible eight-character password containing upper- and lower-case letters, digits, and symbols. Such password policies are common in many enterprise settings.
  • 5. New series of DDoS attacks against U.S Financial Institutions After an almost one-month hiatus, five U.S.-based banks, U.S. Bancorp, JPMorgan Chase, Bank of America, PNC Financial Services Group, and SunTrust, are again being targeted for a series of denial of service (DoS) attacks by a hacker group called Izz ad-Din al-Qassam Cyber Fighters.
  • 6. Google's Android app scanner falls short in security test The Google scanner that checks apps for malware before they are installed on an Android smartphone or tablet has a detection rate that falls far behind that of third-party antivirus products. Out of more than 1,200 malware samples, the Google scanner detected 193 for a "low detection rate of 15.32%”. Antivirus software needs to have a rate of more than 80% to be considered at least good.
  • 7. Syria suffers nation-wide communications outage On 29 November, Syria witnessed a nation-wide Internet blackout. The blackout isolated the country, blocking landlines and cellphone networks. Many speculated that the outage was caused by President Bashar Assad’s regime, as the exclusive provider of Internet access in Syria is the state-run Syrian Telecommunications Establishment. The regime however, blamed it on the rebels as a “terrorist act”.
  • 8. Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware Researchers at ReVuln have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The researcher’s could access : • TV settings and channel lists • SecureStorage accounts • Widgets and their configurations • History of USB movies • ID • Firmware • Whole partitions • USB drives attached to the TV
  • 9. Internet Explorer flaw A flaw in the way Internet Explorer implements the Event Model allows an attacker to track mouse movements anywhere on the screen, even outside of the browser, regardless of the browser window’s state (minimized, maximized, focused or unfocused) as well as the state of the control, shift and alt keys.