SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Information security news
News Bytes
April 2013
Spamhaus DDoS attack
Spamhaus supplies lists of IP addresses for
servers and computers on the net linked to the
distribution of spam.
Between March 19 and March 22 10Gbps –
90Gbps
March 26 – 300Gbps DNS reflection attack –
congestion of Tier 1s, primarily in Europe
Cyberbunker, a hosting company that operates
out of an abandoned NATO bunker in the
Netherlands, is known for hosting almost any
website, except those involved with terrorism
and child pornography
'Chameleon Botnet' takes $6-million-a-month in ad money
Researchers at Spider.io discovered a
‘human-like’ botnet counting over 120,000
infected systems, and costing advertisers
more than $6 million a month
According to Spider.io. Chameleon is the
first botnet to directly impact display
advertisers rather than text-link advertisers.
Simulating human activity, the click-fraud botnet was used to steal money from unwary
advertisers on over 200 websites, hijacking at least 65 percent of their traffic from ads
Samsung lock screen flaw found!!!
Similar to one that was revealed by another
researcher earlier this year on iPhones. On a
Samsung handset, users can, from the lock
screen, pretend to dial an emergency services
number, quickly dismiss it, and with some
sleight of hand, quickly gain access to any app
or widget, or the settings menu in the device.
The dialer can also be launched, allowing the
"hacker" to place a call.
Google rolls out initiative to help hacked sites
Google has launched "Help for Hacked
Sites" informational series, which has a
dozen articles and videos aimed to help
people avoid having their sites hacked
and also teach them how to gain back
control of compromised sites.
Researchers highlight potential security risk to iOS users
iOS profiles, aka mobileconfig files, are used
by mobile carriers to configure key settings
for e-mail, Wi-Fi, and other features. But
these files could be abused by attackers to
sneak past Apple's normally tight security
1) You should only install profiles from trusted websites or
applications.
2) Make sure you download profiles via a secure channel
(e.g., use profile links that start with https and not http).
3) Beware of non-verified mobileconfigs. While a verified
profile isn't necessarily a safe one, a non-verified should
certainly raise your suspicion.
Trojan.Yontoo.1 targets Mac OS X systems
Trojan.Yontoo.1 can also be
downloaded as a media player, a
video quality enhancement
program, or a download
accelerator, Dr. Web said.
Once launched, the Trojan generates a dialog box that offers to install Free Twit Tube. After
users presses "continue," the Trojan downloads the Yontoo adware plug-in for Safari, Chrome,
and Firefox.
The plug-in transmits information about the pages users visit and embeds third-party code into
those pages
Apple: Critical Update for Java for OS X Lion and Mac OS X
Apple has released a critical Java update to
mitigate multiple vulnerabilities that "may
allow an attacker to execute arbitrary code,
cause a denial-of-service condition, or
disclose sensitive information," according to
US-CERT.
The following products are included in the updates:
OS X v10.6.8
OS X server v10.6.8
OS X Lion v10.7.3
Lion Server v10.7.3
Microsoft Updates April 2013 - 3 Critical Vulnerabilities
Kali Linux Features
Complete re-build of BackTrack Linux, adhering completely to Debian development
standards
More than 300 penetration testing tools
Open source Git tree
FHS compliant
Vast wireless device support
Custom kernel patched for injection
Secure development environment
GPG signed packages and repos
Multi-language
Completely customizable
ARMEL and ARMHF support currently available for the following ARM devices:
rk3306 mk/ss808
Raspberry Pi
ODROID U2/X2
Samsung Chromebook
Kali is specifically tailored to penetration testing and therefore, all documentation on this
site assumes prior knowledge of the Linux operating system.
Thank You
aniket_nd@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

My presentation
My presentationMy presentation
My presentation
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Security News Byes- Nov
Security News Byes- NovSecurity News Byes- Nov
Security News Byes- Nov
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Malwares
MalwaresMalwares
Malwares
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 

Andere mochten auch (7)

Große ferien villa camps bay
Große ferien villa camps bayGroße ferien villa camps bay
Große ferien villa camps bay
 
8 de mayo
8 de mayo8 de mayo
8 de mayo
 
Презентация отдела разработки технологических решений
Презентация отдела разработки технологических решений Презентация отдела разработки технологических решений
Презентация отдела разработки технологических решений
 
O que seria a Indústria 4.0?
O que seria a Indústria 4.0?O que seria a Indústria 4.0?
O que seria a Indústria 4.0?
 
Presentación de isaac peral y caballero 2º ESO
Presentación de isaac peral y caballero 2º ESOPresentación de isaac peral y caballero 2º ESO
Presentación de isaac peral y caballero 2º ESO
 
Asma
AsmaAsma
Asma
 
PenkunasGregoryResume 2
PenkunasGregoryResume 2PenkunasGregoryResume 2
PenkunasGregoryResume 2
 

Ähnlich wie Newsbytes april2013

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
UltraUploader
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
anbersattar
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
dogallama
 

Ähnlich wie Newsbytes april2013 (20)

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
The malware effects
The malware effectsThe malware effects
The malware effects
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
File000145
File000145File000145
File000145
 
Hamza
HamzaHamza
Hamza
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Botnet
BotnetBotnet
Botnet
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 

Mehr von n|u - The Open Security Community

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Newsbytes april2013

  • 2. Spamhaus DDoS attack Spamhaus supplies lists of IP addresses for servers and computers on the net linked to the distribution of spam. Between March 19 and March 22 10Gbps – 90Gbps March 26 – 300Gbps DNS reflection attack – congestion of Tier 1s, primarily in Europe Cyberbunker, a hosting company that operates out of an abandoned NATO bunker in the Netherlands, is known for hosting almost any website, except those involved with terrorism and child pornography
  • 3. 'Chameleon Botnet' takes $6-million-a-month in ad money Researchers at Spider.io discovered a ‘human-like’ botnet counting over 120,000 infected systems, and costing advertisers more than $6 million a month According to Spider.io. Chameleon is the first botnet to directly impact display advertisers rather than text-link advertisers. Simulating human activity, the click-fraud botnet was used to steal money from unwary advertisers on over 200 websites, hijacking at least 65 percent of their traffic from ads
  • 4. Samsung lock screen flaw found!!! Similar to one that was revealed by another researcher earlier this year on iPhones. On a Samsung handset, users can, from the lock screen, pretend to dial an emergency services number, quickly dismiss it, and with some sleight of hand, quickly gain access to any app or widget, or the settings menu in the device. The dialer can also be launched, allowing the "hacker" to place a call.
  • 5. Google rolls out initiative to help hacked sites Google has launched "Help for Hacked Sites" informational series, which has a dozen articles and videos aimed to help people avoid having their sites hacked and also teach them how to gain back control of compromised sites.
  • 6. Researchers highlight potential security risk to iOS users iOS profiles, aka mobileconfig files, are used by mobile carriers to configure key settings for e-mail, Wi-Fi, and other features. But these files could be abused by attackers to sneak past Apple's normally tight security 1) You should only install profiles from trusted websites or applications. 2) Make sure you download profiles via a secure channel (e.g., use profile links that start with https and not http). 3) Beware of non-verified mobileconfigs. While a verified profile isn't necessarily a safe one, a non-verified should certainly raise your suspicion.
  • 7. Trojan.Yontoo.1 targets Mac OS X systems Trojan.Yontoo.1 can also be downloaded as a media player, a video quality enhancement program, or a download accelerator, Dr. Web said. Once launched, the Trojan generates a dialog box that offers to install Free Twit Tube. After users presses "continue," the Trojan downloads the Yontoo adware plug-in for Safari, Chrome, and Firefox. The plug-in transmits information about the pages users visit and embeds third-party code into those pages
  • 8. Apple: Critical Update for Java for OS X Lion and Mac OS X Apple has released a critical Java update to mitigate multiple vulnerabilities that "may allow an attacker to execute arbitrary code, cause a denial-of-service condition, or disclose sensitive information," according to US-CERT. The following products are included in the updates: OS X v10.6.8 OS X server v10.6.8 OS X Lion v10.7.3 Lion Server v10.7.3
  • 9. Microsoft Updates April 2013 - 3 Critical Vulnerabilities
  • 10.
  • 11. Kali Linux Features Complete re-build of BackTrack Linux, adhering completely to Debian development standards More than 300 penetration testing tools Open source Git tree FHS compliant Vast wireless device support Custom kernel patched for injection Secure development environment GPG signed packages and repos Multi-language Completely customizable ARMEL and ARMHF support currently available for the following ARM devices: rk3306 mk/ss808 Raspberry Pi ODROID U2/X2 Samsung Chromebook Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior knowledge of the Linux operating system.