1600 Burrstone Road, Utica, NY 13502
(315) 792-3006

Tag: Vulnerabilities

NM Governor’s Former Campaign Manager Indicted on Computer Intrusion Charges

(Security Week) A former campaign manager for New Mexico Gov. Susana Martinez has been indicted by a federal grand jury on charges of computer intrusion and making a false statement. Jamie Estrada, 40, of Los Lunas, New Mexico, is accused of using his access to the campaign’s domain to intercept communications and lying to federal…
Read more

Ransomware Cashout Service Abuses US Betting Website

(Softpedia) Security expert Brian Krebs has identified a ransomware cashout service that abuses a feature integrated into a US-based betting website to allow cybercriminals to launder their illegally earned funds. Cybercriminals can make millions of dollars each year with the aid of ransomware, the malicious elements that lock up computers and keep them that way…
Read more

CEPOL – European Police College Hacked, 14,000+ Credentials Leaked

(CyberWarNews) A hacker  using the handle slacker @sl4ck3 has contacted cwn with a recent breach on the European Police College site. (CEPOL) European Police College website(https://www.cepol.europa.eu/) was breached some time around the 26th may by hackers using the Zone-h name omarxarmy who have been using the defacement archive site just over 1 year now…read full article

DNSimple Hit by Major DDOS Attack

(Softpedia) DNSimple, a hosted DNS service that allows users to easily manage their domains, is currently being hit by a massive distributed denial-of-service (DDOS) attack. The first reports about a DDOS attack came from the company on May 31. Around one hour ago, DNSimple said it was experiencing a “significantly larger and sustained DDoS.”…read full…
Read more

Android malware in pictures – a blow-by-blow account of mobile scareware

(Naked Security) Fake anti-virus, also suggestively known as scareware, tricks you into paying money by pretending to find threats such as viruses and Trojans on your computer. The scan to find the “threats” is free; the cleanup part is not. If you do pay up, the software then pretends to remove the non-existent threats so…
Read more

‘Syrian Electronic Army’ fails to crack Israeli water system

(The Register) Attempts purportedly made by pro-Assad hacktivists to attack water systems in northern Israel have failed, recent reports reveal. The Syrian Electronic Army have more or less cornered the market in attacks on high-profile media accounts on Twitter over recent months with attacks on the BBC, The Guardian, AP and others. Two victims –…
Read more

Cyber threats pose ‘stealthy, insidious’ danger: defense chief

(Reuters) – Defense Secretary Chuck Hagel said on Friday that cyber threats posed a “quiet, stealthy, insidious” danger to the United States and other nations, and called for “rules of the road” to guide behavior and avoid conflict on global computer networks. Hagel said he would address cyber security in his speech on Saturday to…
Read more

Some companies looking at retaliating against cyber attackers

(LA Times) Frustrated by their inability to stem an onslaught of computer hackers, some companies are considering adopting the standards of the Wild West to fight back against online bandits. In taking an eye-for-an-eye approach, some of the companies that have been attacked are looking at retaliating against the attackers, covertly shutting down computers behind…
Read more

New Infographic Portrays Motives And Methods Of The Three Most Dangerous Types Of Hackers

(Dark Reading) WatchGuard Technologies, a global leader in manageable business security solutions, today released an infographic profiling three notorious, headlining categories of hackers posing the largest threats to today’s businesses. Between a recent breach that enabled hackers to steal money from ATMs, cyber espionage claims against China and denial of service (DoS) attacks on financial…
Read more