Hackin9

InfoSec News


The Age

What criminals do with stolen passwords
The Age
Not long ago, PCs compromised by malware were put to a limited number of fraudulent uses, including spam, click fraud and denial-of-service attacks. These days, computer crooks are extracting and selling a much broader array of data stolen from hacked ...

and more »
 

Sydney Morning Herald

What criminals do with stolen passwords
Sydney Morning Herald
Analysis. Stolen credentials are useful to a number of scams. Stolen credentials are useful to criminals for a number of scams. Photo: Kerrie Leishman. Not long ago, PCs compromised by malware were put to a limited number of fraudulent uses, including ...

and more »
 
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
U.S. authorities have charged a former research analyst at a financial services firm with insider trading offenses related to the 2009 acquisition of software vendor SPSS by IBM.
 
Microsoft on Wednesday revealed six locations for new retail stores it will open in early 2013, including four transformed from its holiday specialty stores, dubbed "pop-ups," that it established in October.
 
Social engineering attacks and stolen passwords are giving attackers unfettered access to corporate systems for extended periods of time.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
A power station in the south of Iran has been hit by a cyberattack, an Iranian news agency reported Tuesday, citing a local civil defense official. But now agency and official are in dispute over whether he really made the remarks.
 
Cyber extortionists shilling "ransomware" have upped the ante by pushing users' panic buttons with claims that their malware will wipe hard drives, a security firm said Monday.
 
The year is drawing to a close, so there's a very good chance that you now find yourself staring straight down the gaping maw of Windows 8.
 

Brisbane Times

new cyber attack by Stuxnet
Brisbane Times
A suspected uranium-enrichment facility near Qom, 156 km southwest of Tehran, in this September 27, 2009 satellite photograph released by DigitalGlobe. Photo: REUTERS/DigitalGlobe. An Iranian semi-official news agency says there has been another ...

 
A class action lawsuit has been filed against Instagram over the company's controversial update to its terms of service last week.
 
Netflix has restored its streaming video services, after Christmas outages related to problems with Amazon's online computing platform.
 
A look back at the lives and contributions of 13 technology pioneers, including Ray Bradbury, Sally Ride and David L. Waltz, who passed away in 2012. See some of the luminaries featured in video interviews; others in photographs.
 
The most controversial tech issue taken up by the outgoing Congress was, by far, the Stop Online Piracy Act (SOPA). Here's the outlook for legislation for the next Congress.
 
RETIRED: Microsoft December 2012 Advance Notification Multiple Vulnerabilities
 
WordPress Asset Manager Plugin 'upload.php' Arbitrary File Upload Vulnerability
 
Internet Storm Center Infocon Status