SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Information security news




News Bytes
Facebook helps FBI shut down Butterfly Botnet


                            US Department of Justice
                            arrested 10 suspects involved
                            in global Butterfly botnet
                            operation that infected more
                            than 11 million systems and
                            caused more than $850m in
                            losses. Yahos targeted
                            Facebook users from 2010 to
                            October 2012. Facebook’s
                            security team provided
                            assistance to law enforcement
                            throughout the investigation
                            by helping to identify the root
                            cause, the perpetrators, and
                            those affected by the malware.
Yahoo! mail hijacking exploit


                                 A “cross-site scripting” (XSS)
                                weakness in yahoo.com lets
                                attackers steal cookies from
                                Yahoo! Webmail users. The
                                XSS flaw falls into the
                                category of a stored
                                vulnerability, which inserts
                                malicious code into a file,
                                database, or back-end
                                system. The malicious script
                                is then retrieved from the
                                server when it requests the
                                stored information.
25-GPU cluster cracks every standard Windows
password in <6 hours


                              A five-sever Linux-based GPU cluster
                              running the Virtual OpenCL cluster
                              platform that harnesses the power
                              of 25 AMD Radeon graphics cards
                              achieves 350 billion-guess-per-
                              second speed when cracking
                              password hashes generated by the
                              NTLM cryptographic algorithm that
                              Microsoft has included in every
                              version of Windows since Server
                              2003. As a result, it can try an
                              astounding 95^8 combinations in
                              just 5.5 hours, enough to brute force
                              every possible eight-character
                              password containing upper- and
                              lower-case letters, digits, and
                              symbols. Such password policies are
                              common in many enterprise settings.
New series of DDoS attacks against U.S Financial
Institutions


                                 After an almost one-month
                                 hiatus, five U.S.-based
                                 banks, U.S. Bancorp,
                                 JPMorgan Chase, Bank of
                                 America, PNC Financial
                                 Services Group, and
                                 SunTrust, are again being
                                 targeted for a series of
                                 denial of service (DoS)
                                 attacks by a hacker group
                                 called Izz ad-Din al-Qassam
                                 Cyber Fighters.
Google's Android app scanner falls short in security
test


                                 The Google scanner that
                                 checks apps for malware
                                 before they are installed on an
                                 Android smartphone or tablet
                                 has a detection rate that falls
                                 far behind that of third-party
                                 antivirus products. Out of
                                 more than 1,200 malware
                                 samples, the Google scanner
                                 detected 193 for a "low
                                 detection rate of 15.32%”.
                                 Antivirus software needs to
                                 have a rate of more than 80%
                                 to be considered at least good.
Syria suffers nation-wide communications outage


                               On 29 November, Syria witnessed
                               a nation-wide Internet blackout.
                               The blackout isolated the country,
                               blocking landlines and cellphone
                               networks. Many speculated that
                               the outage was caused by
                               President Bashar Assad’s regime,
                               as the exclusive provider of
                               Internet access in Syria is the
                               state-run Syrian
                               Telecommunications
                               Establishment. The regime
                               however, blamed it on the rebels
                               as a “terrorist act”.
Samsung Smart TV security hole allows hackers to
watch you, change channels or plug in malware


                               Researchers at ReVuln have found a
                               vulnerability in an unspecified model
                               of a Samsung LED 3D TV that they
                               exploited to get root access to the TV
                               and any attached USB drives. The
                               researcher’s could access :
                               • TV settings and channel lists
                               • SecureStorage accounts
                               • Widgets and their configurations
                               • History of USB movies
                               • ID
                               • Firmware
                               • Whole partitions
                               • USB drives attached to the TV
Internet Explorer flaw


                         A flaw in the way Internet
                         Explorer implements the
                         Event Model allows an
                         attacker to track mouse
                         movements anywhere on
                         the screen, even outside of
                         the browser, regardless of
                         the browser window’s state
                         (minimized, maximized,
                         focused or unfocused) as
                         well as the state of the
                         control, shift and alt keys.

Weitere ähnliche Inhalte

Was ist angesagt?

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Software theft
Software theftSoftware theft
Software theftchrispaul8676
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
Code protection
Code protectionCode protection
Code protectionwhitecryption
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z Cheng Olayvar
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors SeminarChaitali Patel
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials TheftLavi Lazarovitz
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark LabsLavi Lazarovitz
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8Phillip LiPari
 

Was ist angesagt? (20)

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Software theft
Software theftSoftware theft
Software theft
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Code protection
Code protectionCode protection
Code protection
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials Theft
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
BPS-DellWorld
BPS-DellWorldBPS-DellWorld
BPS-DellWorld
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark Labs
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8
 

Andere mochten auch

Belle Bretagne
Belle BretagneBelle Bretagne
Belle BretagneLota Moncada
 
Brt session 2 b seminar presentation indii format do 21 jan 10 b indo
Brt session 2 b seminar presentation indii format do 21 jan 10 b indoBrt session 2 b seminar presentation indii format do 21 jan 10 b indo
Brt session 2 b seminar presentation indii format do 21 jan 10 b indoIndonesia Infrastructure Initiative
 
Monthly market report 0612
Monthly market report 0612Monthly market report 0612
Monthly market report 0612Len Nevin
 
Mobile learning workshop
Mobile learning workshopMobile learning workshop
Mobile learning workshopDaniela Gachago
 
18 Green Living Tips
18 Green Living Tips18 Green Living Tips
18 Green Living TipsTed Ollikkala
 
Ver mirar
Ver mirarVer mirar
Ver mirarsolperez04
 
Podcasting workshop 2010
Podcasting workshop 2010Podcasting workshop 2010
Podcasting workshop 2010Daniela Gachago
 
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketing
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketingLandscape of U.S. Financial Professionals & Firms, in terms of direct marketing
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketingDC Campbell
 
Planejamento de Comunição em Meios Digitais
Planejamento de Comunição em Meios DigitaisPlanejamento de Comunição em Meios Digitais
Planejamento de Comunição em Meios DigitaisJumpEducation
 
Schulerhof Wellness-Brochure 2015
Schulerhof Wellness-Brochure 2015Schulerhof Wellness-Brochure 2015
Schulerhof Wellness-Brochure 2015Hotel Schulerhof
 
MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)
MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)
MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)Armando Soares de Moura
 

Andere mochten auch (16)

Belle Bretagne
Belle BretagneBelle Bretagne
Belle Bretagne
 
ANU-MIMO_whitepaper
ANU-MIMO_whitepaperANU-MIMO_whitepaper
ANU-MIMO_whitepaper
 
Brt session 2 b seminar presentation indii format do 21 jan 10 b indo
Brt session 2 b seminar presentation indii format do 21 jan 10 b indoBrt session 2 b seminar presentation indii format do 21 jan 10 b indo
Brt session 2 b seminar presentation indii format do 21 jan 10 b indo
 
Monthly market report 0612
Monthly market report 0612Monthly market report 0612
Monthly market report 0612
 
Blackspot 8 citrun
Blackspot 8   citrunBlackspot 8   citrun
Blackspot 8 citrun
 
Mobile learning workshop
Mobile learning workshopMobile learning workshop
Mobile learning workshop
 
18 Green Living Tips
18 Green Living Tips18 Green Living Tips
18 Green Living Tips
 
Ver mirar
Ver mirarVer mirar
Ver mirar
 
Podcasting workshop 2010
Podcasting workshop 2010Podcasting workshop 2010
Podcasting workshop 2010
 
Understanding governance
Understanding governanceUnderstanding governance
Understanding governance
 
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketing
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketingLandscape of U.S. Financial Professionals & Firms, in terms of direct marketing
Landscape of U.S. Financial Professionals & Firms, in terms of direct marketing
 
Planejamento de Comunição em Meios Digitais
Planejamento de Comunição em Meios DigitaisPlanejamento de Comunição em Meios Digitais
Planejamento de Comunição em Meios Digitais
 
2008 pmk-169
 2008 pmk-169 2008 pmk-169
2008 pmk-169
 
Schulerhof Wellness-Brochure 2015
Schulerhof Wellness-Brochure 2015Schulerhof Wellness-Brochure 2015
Schulerhof Wellness-Brochure 2015
 
MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)
MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)
MĂşsica Tudo tem seu par (Cancioneiro EspĂ­rita)
 
Pengantar rs-sby-30may12
Pengantar rs-sby-30may12Pengantar rs-sby-30may12
Pengantar rs-sby-30may12
 

Ă„hnlich wie News Bytes - December 2012

cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewAntiy Labs
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Businesscherienetclarity
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptxJoselitoJMebolos
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 

Ă„hnlich wie News Bytes - December 2012 (20)

cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial View
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Information security
Information securityInformation security
Information security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
NetWitness
NetWitnessNetWitness
NetWitness
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
It ppt new
It ppt newIt ppt new
It ppt new
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

KĂĽrzlich hochgeladen

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

KĂĽrzlich hochgeladen (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

News Bytes - December 2012

  • 2. Facebook helps FBI shut down Butterfly Botnet US Department of Justice arrested 10 suspects involved in global Butterfly botnet operation that infected more than 11 million systems and caused more than $850m in losses. Yahos targeted Facebook users from 2010 to October 2012. Facebook’s security team provided assistance to law enforcement throughout the investigation by helping to identify the root cause, the perpetrators, and those affected by the malware.
  • 3. Yahoo! mail hijacking exploit A “cross-site scripting” (XSS) weakness in yahoo.com lets attackers steal cookies from Yahoo! Webmail users. The XSS flaw falls into the category of a stored vulnerability, which inserts malicious code into a file, database, or back-end system. The malicious script is then retrieved from the server when it requests the stored information.
  • 4. 25-GPU cluster cracks every standard Windows password in <6 hours A five-sever Linux-based GPU cluster running the Virtual OpenCL cluster platform that harnesses the power of 25 AMD Radeon graphics cards achieves 350 billion-guess-per- second speed when cracking password hashes generated by the NTLM cryptographic algorithm that Microsoft has included in every version of Windows since Server 2003. As a result, it can try an astounding 95^8 combinations in just 5.5 hours, enough to brute force every possible eight-character password containing upper- and lower-case letters, digits, and symbols. Such password policies are common in many enterprise settings.
  • 5. New series of DDoS attacks against U.S Financial Institutions After an almost one-month hiatus, five U.S.-based banks, U.S. Bancorp, JPMorgan Chase, Bank of America, PNC Financial Services Group, and SunTrust, are again being targeted for a series of denial of service (DoS) attacks by a hacker group called Izz ad-Din al-Qassam Cyber Fighters.
  • 6. Google's Android app scanner falls short in security test The Google scanner that checks apps for malware before they are installed on an Android smartphone or tablet has a detection rate that falls far behind that of third-party antivirus products. Out of more than 1,200 malware samples, the Google scanner detected 193 for a "low detection rate of 15.32%”. Antivirus software needs to have a rate of more than 80% to be considered at least good.
  • 7. Syria suffers nation-wide communications outage On 29 November, Syria witnessed a nation-wide Internet blackout. The blackout isolated the country, blocking landlines and cellphone networks. Many speculated that the outage was caused by President Bashar Assad’s regime, as the exclusive provider of Internet access in Syria is the state-run Syrian Telecommunications Establishment. The regime however, blamed it on the rebels as a “terrorist act”.
  • 8. Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware Researchers at ReVuln have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The researcher’s could access : • TV settings and channel lists • SecureStorage accounts • Widgets and their configurations • History of USB movies • ID • Firmware • Whole partitions • USB drives attached to the TV
  • 9. Internet Explorer flaw A flaw in the way Internet Explorer implements the Event Model allows an attacker to track mouse movements anywhere on the screen, even outside of the browser, regardless of the browser window’s state (minimized, maximized, focused or unfocused) as well as the state of the control, shift and alt keys.